Blar i Vitenskapelige publikasjoner (TN-IDE) på tittel
Viser treff 176-195 av 242
-
Realizing a new e-commerce tool for formation of a virtual enterprise
(Journal article; Peer reviewed, 2003)This paper presents a methodology for the development of a new tool for the formation of a virtual enterprise. The formation phase mainly deals with inviting potential collaborators to virtual enterprise and developing a ... -
Recurrent Neural Networks for Artifact Correction in HRV Data During Physical Exercise
(Peer reviewed; Journal article, 2023)In this paper, we propose the use of recurrent neural networks (RNNs) for artifact correction and analysis of heart rate variability (HRV) data. HRV can be a valuable metric for determining the function of the heart and ... -
Report on the 1st Simulation for Information Retrieval Workshop (Sim4IR 2021) at SIGIR 2021
(Journal article, 2021)Simulation is used as a low-cost and repeatable means of experimentation. As Information Retrieval (IR) researchers, we are no strangers to the idea of using simulation within our own field---such as the traditional means ... -
Report on the 44th European Conference on Information Retrieval (ECIR 2022): The First Major Hybrid IR Conference
(Journal article, 2022)The 44th European Conference on Information Retrieval (ECIR’22) was held in Stavanger, Norway. It represents a landmark, not only for being the northernmost ECIR ever, but also for being the first major IR conference in a ... -
Report on the Workshop on Personal Knowledge Graphs (PKG 2021) at AKBC 2021
(Journal article, 2022)The term personal knowledge graph (PKG) has been broadly used to refer to structured representation of information about a given user, primarily in the form of entities that are personally related to the user. The potential ... -
Representing Resources in Petri Net Models: Hardwiring or Soft-coding?
(Conference object, 2011)This paper presents an interesting design problem in developing a new tool for discrete-event dynamic systems (DEDS). A new tool known as GPenSIM was developed for modeling and simulation of DEDS; GPenSIM is based on Petri ... -
Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario
(Peer reviewed; Journal article, 2023-11)The fifth generation (5G) of mobile networks may offer a custom logical and virtualized network called network slicing. This virtualization opens a new opportunity to share infrastructure resources and encourage cooperation ... -
Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective
(Peer reviewed; Journal article, 2023)In recent years, there has been a trend to integrate networking and computing systems, whose management is getting increasingly complex. Resource allocation is one of the crucial aspects of managing such systems and is ... -
Revenue Maximization of a Slice Broker in the Presence of Byzantine Faults
(Chapter, 2023)Multi-Access Edge Computing (MEC) and network slicing are vital for advancing the Fifth Generation (5G) of cellular systems. MEC provides context awareness and reduces the latency for communication. Network slicing allows ... -
Revenue-Model Learning for a Slice Broker in the Presence of Adversaries
(Chapter, 2023)Multi-Access Edge Computing (MEC) and network slicing two of the key enabling technologies of the Fifth Generation (5G) of cellular network. MEC helps to reduce latency, offload the cloud, and allow context-awareness. ... -
Revisiting Petri Net Modeling of the Cigarette Smokers' Problem: A GPenSIM Approach
(Conference object, 2013-11)Petri Nets is a family of modeling formalisms, with different interpretations and abstraction levels; the Petri nets family of modeling formalisms includes ordinary Petri Net, generalized Petri Net, and also all other ... -
Rhythm Analysis during Cardiopulmonary Resuscitation Using Convolutional Neural Networks
(Peer reviewed; Journal article, 2020-05)Chest compressions during cardiopulmonary resuscitation (CPR) induce artifacts in the ECG that may provoque inaccurate rhythm classification by the algorithm of the defibrillator. The objective of this study was to design ... -
Rhythm analysis during cardiopulmonary resuscitation: past, present, and future
(Journal article; Peer reviewed, 2014-01)Survival from out-of-hospital cardiac arrest depends largely on two factors: early cardiopulmonary resuscitation (CPR) and early defibrillation. CPRmust be interrupted for a reliable automated rhythmanalysis because chest ... -
Risk in the Age of Software Security
(Others, 2017)For general applications, it is way too costly to aim for 100 % secure software; for complex systems it may even be impossible. To achieve effective software security at reasonable cost, it is thus necessary to identify ... -
Robust observer-based leader-following consensus for a class of nonlinear multi-agent systems: application to UAV formation control
(Peer reviewed; Journal article, 2021)This paper presents the design of a robust observer-based control for a class of nonlinear multi-agent systems. The leader-following consensus problem is solved in order for all the agents to follow the trajectory of a ... -
The Role of 5G Technologies in a Smart City: The Case for Intelligent Transportation System
(Peer reviewed; Journal article, 2021-05)A smart city is an urban area that collects data using various electronic methods and sensors. Smart cities rely on Information and Communication Technologies (ICT) and aim to improve the quality of services by managing ... -
Saving Nine Without Stitching in Time: Integrity Check After-the-fact
(Chapter, 2021)Electrical substations transform voltage from high to low, or low to high for distribution and transmission, respectively, and are a critical part of our electricity infrastructure. The state of a substation is continuously ... -
Scanning the Medical Terrain : an aid to quicker adoption of guidelines
(Peer reviewed; Journal article, 2019)Guidelines exist in order to ensure efficient, effective and consistent provision of healthcare service. Unfortunately, existing guidelines are often not adopted in a timely manner, even to the point of being outdated at ... -
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
(Peer reviewed; Journal article, 2022)6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ... -
Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks
(Peer reviewed; Journal article, 2022-09-14)Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and ...