Blar i Vitenskapelige publikasjoner (TN-IDE) på dokumenttype "Chapter"
Viser treff 1-20 av 40
-
Accountability Requirements for the Cloud
(Chapter, 2017)In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ... -
Ad Hoc Table Retrieval using Semantic Similarity
(Chapter, 2018)We introduce and address the problem of ad hoc table retrieval: answering a keyword query with a ranked list of tables. This task is not only interesting on its own account, but is also being used as a core component in ... -
Architectural Risk Analysis in Agile Development of Cloud Software
(Chapter, 2019)Software in the cloud is predominantly developed using agile methodologies, where practices such as continuous deployment and DevOps contribute to increased speed and quick turnarounds. This increased speed does however ... -
Automating Security in a Continuous Integration Pipeline
(Chapter, 2022)Traditional approaches to software security are based on manual methods, which tend to stall development, leading to inefficiency. To speed up a software development lifecycle, security needs to be integrated and automated ... -
Availability model of a 5G-MEC system
(Chapter, 2023)Multi-access Edge Computing (MEC) is one of the enabling technologies of the fifth generation (5G) of mobile networks. MEC enables services with strict latency requirements by bringing computing capabilities close to the ... -
Conversational Entity Linking: Problem Definition and Datasets
(Chapter, 2021-07)Machine understanding of user utterances in conversational systems is of utmost importance for enabling engaging and meaningful conversations with users. Entity Linking (EL) is one of the means of text understanding, with ... -
Detection and localization of melanoma skin cancer in histopathological whole slide images
(European Signal Processing Conference;, Chapter; Conference object, 2023)If melanoma is diagnosed and treated in its early stages can increase the survival rate. A projected increase in skin cancer incidents and a shortage of dermatopathologists have emphasized the need for computational pathology ... -
Efficient Continuous Multi-Query Processing over Graph Streams
(Advances in database technology EDBT;23rd, Chapter, 2020) -
Experimental Evaluation of Handover Strategies in 5G-MEC Scenario by using AdvantEDGE
(Chapter, 2022)The 5G-MEC architecture increases the heterogene-ity and dynamicity of the available resources, presenting unique and competing challenges to researchers, network designers, and application developers. Recent studies ... -
Exploring the need for a CERT for the Norwegian Construction Sector
(Chapter, 2023)This paper presents an empirical study on the need for sector-specific CERT capacity in the Norwegian construction sector. Findings from the interviews demonstrate a need for developing competence in ICT security in this ... -
An Extensible Framework for Implementing and Validating Byzantine Fault-tolerant Protocols
(Chapter, 2023-06)HotStuff is a Byzantine fault-tolerant state machine replication protocol that incurs linear communication costs to achieve consensus. This linear scalability promoted the protocol to be adopted as the consensus mechanism ... -
Formal Verification of HotStuff
(Chapter, 2021)HotStuff is a recent algorithm for repeated distributed consensus used in permissioned blockchains. We present a simplified version of the HotStuff algorithm and verify its safety using both Ivy and the TLA Proof Systems ... -
From Baseline to Top Performer: A Reproducibility Study of Approaches at the TREC 2021 Conversational Assistance Track
(Chapter, 2023)This paper reports on an effort of reproducing the organizers’ baseline as well as the top performing participant submission at the 2021 edition of the TREC Conversational Assistance track. TREC systems are commonly regarded ... -
GPensim: a new petri net simulator
(Chapter; Peer reviewed, 2010) -
Invasive cancerous area detection in non-muscle invasive bladder cancer whole slide images
(Chapter, 2022)Bladder cancer patients’ stratification into risk groups relies on grade, stage and clinical factors. For non-muscle invasive bladder cancer, T1 tumours that invade the subepithelial tissue are high-risk lesions with a ... -
The Isolation Concept in the 5G Network Slicing
(Chapter, 2020)The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be ... -
Making sense of nonsense : Integrated gradient-based input reduction to improve recall for check-worthy claim detection
(CEUR Workshop Proceedings;, Chapter, 2023)Analysing long text documents of political discourse to identify check-worthy claims (claim detection) is known to be an important task in automated fact-checking systems, as it saves the precious time of fact-checkers, ... -
MigraMEC: Hybrid Testbed for MEC App Migration
(Chapter, 2023)Multi-access Edge Computing (MEC) enhances the capabilities of 5G by enabling the computation closer to the end-user for real-time and context-aware services. One of the main challenges of MEC is the migration of the MEC ... -
Minimizing the Cost of 5G Network Slice Broker
(Chapter, 2021)Network slicing is a key enabler of the fifth-generation (5G) of mobile networks. It allows creating multiple logical networks, i.e. network slices, with heterogeneous requirements over a common underlying infrastructure. ... -
Mitigating non-linear DAC glitches using dither in closed-loop nano-positioning applications
(American Control COnference (ACC);, Chapter, 2023)Digital-to-analog conversion is essential in digital signal processing applications, including closed-loop control schemes. Noise and distortion in digital-to-analog converters result in reduced performance for high-precision ...