• Accountability Requirements for the Cloud 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Chapter, 2017)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ...
    • Accountability Requirements in the Cloud Provider Chain 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Journal article; Peer reviewed, 2018-04)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ...
    • Activity-Oriented Petri Net for scheduling of resources 

      Davidrajuh, Reggie (Conference object, 2012-10)
      This work presents a new methodology for modeling discrete systems in which activities compete for resources. The new methodology known as Activity-Oriented Petri Net (AOPN) allows modelers to concentrate on modeling ...
    • Actuator and sensor fault estimation based on a proportional multiple‐integral sliding mode observer for linear parameter varying systems with inexact scheduling parameters 

      Gómez-Peñate, Samuel; Rotondo, Damiano (Peer reviewed; Journal article, 2020)
      This article proposes an approach for the estimation of states, actuator, and sensor faults in nonlinear systems represented by a polytopic linear parameter varying (LPV) system with inexact scheduling parameters. In the ...
    • Ad Hoc Table Retrieval using Semantic Similarity 

      Zhang, Shuo; Balog, Krisztian (Chapter, 2018)
      We introduce and address the problem of ad hoc table retrieval: answering a keyword query with a ranked list of tables. This task is not only interesting on its own account, but is also being used as a core component in ...
    • Adaptive Methods for Revenue Model learning of a Slice Broker in the Presence of Adversaries 

      Khan, Md Muhidul Islam; Nencioni, Gianfranco (Peer reviewed; Journal article, 2024)
      In the fifth-generation (5G) of mobile networks, Multi-Access Edge Computing (MEC) refers to the deployment of computing resources closer to the end-users for improved service delivery. In the context of 5G MEC, the slice ...
    • Advancing Deep Learning to Improve Upstream Petroleum Monitoring 

      Heghedus, Cristina Viorica; Shchipanov, Anton; Chunming, Rong (Peer reviewed; Journal article, 2019)
      Data analytics is rapidly growing field in both academia and industry dealing with processing and interpreting large and complex data sets. It has got already many successful applications via advancing machine (ML) and ...
    • An interative approach for distribution chain design in agile virtual environment 

      Hongze, Ma; Davidrajuh, Reggie (Journal article; Peer reviewed, 2005)
      Purpose – The study sets out to explore the use of an iterative approach for designing distribution chain in an agile virtual environment; in an agile virtual environment, quick adaptation to changing market situation ...
    • Analysis of deceptive data attacks with adversarial machine learning for solar photovoltaic power generation forecasting 

      Kuzlu, Murat; Sarp, Salih; Catak, Ferhat Özgur; Cali, Umit; Zhao, Yanxiao; Elma, Onur; Guler, Ozgur (Peer reviewed; Journal article, 2022)
      The solar photovoltaics (PV) energy resources have become more important with their significant contribution to the current power grid among renewable energy resources. However, the integration of the solar PV causes ...
    • Analysis of Machine Learning Based Imputation of Missing Data 

      Rizvi, Syed Tahir Hussain; Latif, Muhammad Yasir; Amin, Muhammad Saad; Telmoudi, Achraf Jabeur; Shah, Nasir Ali (Peer reviewed; Journal article, 2023)
      Data analysis and classification can be affected by the availability of missing data in datasets. To deal with missing data, either deletion- or imputation-based methods are used that result in the reduction of data records ...
    • Annotation Markers for runtime replication protocol selection 

      Meling, Hein (Journal article; Peer reviewed, 2008)
      This paper presents an architecture enabling developers to easily and flexibly assign replication protocols simply by annotating individual server methods. This avoids using costly replication protocols for all object ...
    • Application of Borehole Thermal Energy Storage in Waste Heat Recovery from Diesel Generators in Remote Cold Climate Locations 

      Ghoreishi-Madiseh, Seyed Ali; Kuyuk, Ali Fahrettin; de Brito, Marco Antonio Rodrigues; Baidya, Durjoy; Torabigoodarzi, Zahra; Safari, Amir (Peer reviewed; Journal article, 2019-02)
      Remote communities that have limited or no access to the power grid commonly employ diesel generators for communal electricity provision. Nearly 65% of the overall thermal energy input of diesel generators is wasted through ...
    • Architectural Risk Analysis in Agile Development of Cloud Software 

      Jaatun, Martin Gilje (Chapter, 2019)
      Software in the cloud is predominantly developed using agile methodologies, where practices such as continuous deployment and DevOps contribute to increased speed and quick turnarounds. This increased speed does however ...
    • An architecture for self-healing autonomous object groups 

      Meling, Hein (Journal article; Peer reviewed, 2007)
      Jgroup/ARM is a middleware for developing and operating dependable distributed Java applications. Jgroup integrates the distributed object model of Java RMI with the object group paradigm, enabling construction of ...
    • Are you sure it’s an artifact? Artifact detection and uncertainty quantification in histological images 

      Kanwal, Neel; Lopez-Perez, Miguel; Kiraz, Umay; Zuiverloon, Tahlita C M; Molina, Rafael (Peer reviewed; Journal article, 2023)
      Modern cancer diagnostics involves extracting tissue specimens from suspicious areas and conducting histotechnical procedures to prepare a digitized glass slide, called whole slide image (WSI), for further examination. ...
    • Array-based logic for realizing inference engine in mobile applications 

      Davidrajuh, Reggie (Journal article; Peer reviewed, 2007)
      Mobile and wireless devices suffer from technological limitations such as limited battery life and limited memory size. Hence, use of technologies for mobile applications is confined to those technologies that are faster ...
    • The ARTICONF Approach to Decentralized Car-Sharing 

      Saurabh, Nishant; Rubia, Carlos; Palanisamy, Anandakumar; Koulouzis, Spiros; Sefidanoski, Mirsat; Chakravorty, Antorweep; Zhao, Zhiming; Karadimce, Aleksandar; Prodan, Radu (Peer reviewed; Journal article, 2021)
      Social media applications are essential for next-generation connectivity. Today, social media are centralized platforms with a single proprietary organization controlling the network and posing critical trust and governance ...
    • ARTICONF decentralized social media platform for democratic crowd journalism 

      Rito Lima, Inês; Filipe, Vasco; Marinho, Claudia; Ulisses, Alexandre; Chakravorty, Antorweep; Hristov, Atanas; Saurabh, Nishant; Zhao, Zhiming; Xin, Ruyue; Prodan, Radu (Peer reviewed; Journal article, 2023)
      Media production and consumption behaviors are changing in response to new technologies and demands, giving birth to a new generation of social applications. Among them, crowd journalism represents a novel way of constructing ...
    • Artifact Correction in Short-Term HRV during Strenuous Physical Exercise 

      Krolak, Aleksandra; Wiktorski, Tomasz; Bjørkavoll-Bergseth, Magnus; Ørn, Stein (Peer reviewed; Journal article, 2020-11)
      Heart rate variability (HRV) analysis can be a useful tool to detect underlying heart or even general health problems. Currently, such analysis is usually performed in controlled or semi-controlled conditions. Since many ...
    • Artifacts on Magnetic Resonance Imaging from Electronic Identification Enablement in Silicone Gel Implants Are Not Negligible 

      Kurz, Kathinka Dæhli; Kallevåg, Øystein; Austrått, Kenneth; Styr, Bodil Margrethe; Leiknes, Jon Bjarne; Krøger, Pål (Peer reviewed; Journal article, 2021)
      Breast implants filled with silicone gel are used worldwide for cosmetic reasons, or breast reconstruction following risk-reducing or therapeutic mastectomy. The importance of identifiable implants is undeniable. A recent ...