Now showing items 41-60 of 242

    • Risk in the Age of Software Security 

      Jaatun, Martin Gilje (Others, 2017)
      For general applications, it is way too costly to aim for 100 % secure software; for complex systems it may even be impossible. To achieve effective software security at reasonable cost, it is thus necessary to identify ...
    • Experiences using video technologies in teaching programming 

      Tøssebro, Erlend (Peer reviewed; Journal article, 2017)
      This paper deals with experiences of the author and other staff at UiS in using recorded lectures and other video technologies in teaching. Fewer students show up for the lectures than they used to before recording and ...
    • Accountability Requirements for the Cloud 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Chapter, 2017)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ...
    • Entity-Oriented Search 

      Balog, Krisztian (The Information Retrieval Series;39, Book, 2018)
      Search engines have become part of our daily lives. We use Google (Bing, Yandex, Baidu, etc.) as the main gateway to find information on theWeb.With a certain type of content in mind, we may search directly on a particular ...
    • Dependability of the NFV Orchestrator: State of the Art and Research Challenges 

      Gonzalez, Andres Javier; Nencioni, Gianfranco; Kamisinski, Andrzej; Helvik, Bjarne Emil; Heegaard, Poul Einar (Journal article; Peer reviewed, 2018)
      The introduction of network function virtualisation (NFV) represents a significant change in networking technology, which may create new opportunities in terms of cost efficiency, operations, and service provisioning. Although ...
    • SmartTable: A Spreadsheet Program with Intelligent Assistance 

      Zhang, Shuo; Zada, Vugar Abdul; Balog, Krisztian (Chapter, 2018)
      We introduce SmartTable, an online spreadsheet application that is equipped with intelligent assistance capabilities. With a focus on relational tables, describing entities along with their attributes, we offer assistance ...
    • Ad Hoc Table Retrieval using Semantic Similarity 

      Zhang, Shuo; Balog, Krisztian (Chapter, 2018)
      We introduce and address the problem of ad hoc table retrieval: answering a keyword query with a ranked list of tables. This task is not only interesting on its own account, but is also being used as a core component in ...
    • Large Eddy Simulations of flow around two circular cylinders in tandem in the vicinity of a plane wall at small gap ratios 

      Li, Zhong; Abrahamsen-Prsic, Mia; Ong, Muk Chen; Khoo, Boo Cheong (Journal article, 2018)
    • Frå transistor til datamaskin 

      Tengesdal, Morten (Notater fra Universitetet i Stavanger;39, Report, 2018-04)
      Dette skrivet prøver å gi ei forståing av korleis datamaskinar er oppbygde og virkar. Ein ser også på korleis ein kan programmera mindre datamaskinar brukte til styring og overvaking av prosessar. Skrivet er laga for bruk ...
    • Accountability Requirements in the Cloud Provider Chain 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Journal article; Peer reviewed, 2018-04)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ...
    • Orchestration and Control in Software-Defined 5G Networks: Research Challenges 

      Nencioni, Gianfranco; Garroppo, Rosario G.; Gonzalez, Andres J.; Helvik, Bjarne Emil; Procissi, Gregorio (Journal article; Peer reviewed, 2018-08)
      The fifth generation (5G) of cellular networks promises to be a major step in the evolution of wireless technology. 5G is planned to be used in a very broad set of application scenarios. These scenarios have strict ...
    • Security Incident Information Exchange for Cloud Service Provisioning Chains 

      Frøystad, Christian; Tøndel, Inger Anne; Jaatun, Martin Gilje (Journal article; Peer reviewed, 2018-12)
      Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about ...
    • A web based solution to track trawl vessel activities over pipelines in Norwegian Continental Shelf 

      Farmanbar, Mina; Palanisamy, Anandhakumar; Høydal, Anne Britt; Keprate, Arvind; Haug, Gjermund (Peer reviewed; Journal article, 2019)
      Vessel activities such as trawling and anchoring potentially affect pipeline integrity. Therefore, the detailed information about the trawl activity in the area is essential for accurate assessment of pipeline, where to ...
    • Tackling the Cloud Forensic Problem while Keeping your Eye on the GDPR 

      Westerlund, Magnus; Jaatun, Martin Gilje (Chapter, 2019)
      If the cloud is just someone else's computer, securing forensic evidence in case of a breach can be tricky. A blockchain-based distributed ledger could contribute to solve this problem, provided the required forensic ...
    • Architectural Risk Analysis in Agile Development of Cloud Software 

      Jaatun, Martin Gilje (Chapter, 2019)
      Software in the cloud is predominantly developed using agile methodologies, where practices such as continuous deployment and DevOps contribute to increased speed and quick turnarounds. This increased speed does however ...
    • Finding Clusters in Petri Nets An approach based on GPenSIM 

      Davidrajuh, Reggie; Krenczyk, Damian; Skolud, Bozena (Peer reviewed; Journal article, 2019)
      Graph theory provides some methods for finding clusters in networks. Clusters reflect the invisible grouping of the elements in a network. This paper presents a new method for finding clusters in networks. In this method, ...
    • A New Modular Petri Net for Modeling Large Discrete-Event Systems: A Proposal Based on the Literature Study 

      Davidrajuh, Reggie (Peer reviewed; Journal article, 2019)
      Petri net is a highly useful tool for modeling of discrete-event systems. However, Petri net models of real-life systems are enormous, and their state-spaces are usually of infinite size. Thus, performing analysis on the ...
    • Scanning the Medical Terrain : an aid to quicker adoption of guidelines 

      Jaatun, Ellen A. Andreassen; Hepburn, Leigh-Anne; Jaatun, Martin Gilje (Peer reviewed; Journal article, 2019)
      Guidelines exist in order to ensure efficient, effective and consistent provision of healthcare service. Unfortunately, existing guidelines are often not adopted in a timely manner, even to the point of being outdated at ...
    • Open Humans: A platform for participant-centered research and personal data exploration 

      Tzovaras, Bastian Greshake; Angrist, Misha; Arvai, Kevin; Dulaney, Mairi; Estrada-Galiñanes, Vero; Gunderson, Beau; Head, Tim; Lewis, Dana; Nov, Oded; Shaer, Orit; Tzovara, Athina; Bobe, Jason; Ball, Mad Price (Peer reviewed; Journal article, 2019)
      Background Many aspects of our lives are now digitized and connected to the internet. As a result, individuals are now creating and collecting more personal data than ever before. This offers an unprecedented chance for ...
    • The effect of integral control in oscillatory and chaotic reaction kinetic networks 

      Thorsen, Kristian; Drengstig, Tormod; Ruoff, Peter (Peer reviewed; Journal article, 2019)
      Integral control is ubiquitously used in industrial processes to keep variables robustly regulated at a given setpoint. Integral control is also present in many biological systems where it, implemented through reaction ...