• Accountability Requirements for the Cloud 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Chapter, 2017)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ...
    • Ad Hoc Table Retrieval using Semantic Similarity 

      Zhang, Shuo; Balog, Krisztian (Chapter, 2018)
      We introduce and address the problem of ad hoc table retrieval: answering a keyword query with a ranked list of tables. This task is not only interesting on its own account, but is also being used as a core component in ...
    • Architectural Risk Analysis in Agile Development of Cloud Software 

      Jaatun, Martin Gilje (Chapter, 2019)
      Software in the cloud is predominantly developed using agile methodologies, where practices such as continuous deployment and DevOps contribute to increased speed and quick turnarounds. This increased speed does however ...
    • Automating Security in a Continuous Integration Pipeline 

      Chalishhafshejani, Sohrab; Pham, Bao Khanh; JAATUN, Martin Gilje (Chapter, 2022)
      Traditional approaches to software security are based on manual methods, which tend to stall development, leading to inefficiency. To speed up a software development lifecycle, security needs to be integrated and automated ...
    • Availability model of a 5G-MEC system 

      Pathirana, Thilina Dhanushka Kalahe; Nencioni, Gianfranco (Chapter, 2023)
      Multi-access Edge Computing (MEC) is one of the enabling technologies of the fifth generation (5G) of mobile networks. MEC enables services with strict latency requirements by bringing computing capabilities close to the ...
    • Conversational Entity Linking: Problem Definition and Datasets 

      Joko, Hideaki; Hasibi, Faegheh; Balog, Krisztian; de Vries, Arjen (Chapter, 2021-07)
      Machine understanding of user utterances in conversational systems is of utmost importance for enabling engaging and meaningful conversations with users. Entity Linking (EL) is one of the means of text understanding, with ...
    • Detection and localization of melanoma skin cancer in histopathological whole slide images 

      Kanwal, Neel; Amundsen, Roger; Hardardottir, Helga; Tomasetti, Luca; Undersrud, Erling Sandøy; Janssen, Emiel; Engan, Kjersti (European Signal Processing Conference;, Chapter; Conference object, 2023)
      If melanoma is diagnosed and treated in its early stages can increase the survival rate. A projected increase in skin cancer incidents and a shortage of dermatopathologists have emphasized the need for computational pathology ...
    • Efficient Continuous Multi-Query Processing over Graph Streams 

      Zervakis, Lefteris; Setty, Vinay Jayarama; Tryfonopoulos, Christos; Hose, Katja (Advances in database technology EDBT;23rd, Chapter, 2020)
    • Experimental Evaluation of Handover Strategies in 5G-MEC Scenario by using AdvantEDGE 

      Garroppo, Rosario G.; Volpi, Marco; Nencioni, Gianfranco; Wadatkar, Prachi Vinod (Chapter, 2022)
      The 5G-MEC architecture increases the heterogene-ity and dynamicity of the available resources, presenting unique and competing challenges to researchers, network designers, and application developers. Recent studies ...
    • Exploring the need for a CERT for the Norwegian Construction Sector 

      Skytterholm, Andrea Neverdal; Jaatun, Martin Gilje (Chapter, 2023)
      This paper presents an empirical study on the need for sector-specific CERT capacity in the Norwegian construction sector. Findings from the interviews demonstrate a need for developing competence in ICT security in this ...
    • An Extensible Framework for Implementing and Validating Byzantine Fault-tolerant Protocols 

      Gogada, Hanish; Jehl, Leander; Meling, Hein; Olsen, John Ingve (Chapter, 2023-06)
      HotStuff is a Byzantine fault-tolerant state machine replication protocol that incurs linear communication costs to achieve consensus. This linear scalability promoted the protocol to be adopted as the consensus mechanism ...
    • Formal Verification of HotStuff 

      Jehl, Leander (Chapter, 2021)
      HotStuff is a recent algorithm for repeated distributed consensus used in permissioned blockchains. We present a simplified version of the HotStuff algorithm and verify its safety using both Ivy and the TLA Proof Systems ...
    • From Baseline to Top Performer: A Reproducibility Study of Approaches at the TREC 2021 Conversational Assistance Track 

      Lajewska, Weronika; Balog, Krisztian (Chapter, 2023)
      This paper reports on an effort of reproducing the organizers’ baseline as well as the top performing participant submission at the 2021 edition of the TREC Conversational Assistance track. TREC systems are commonly regarded ...
    • GPensim: a new petri net simulator 

      Davidrajuh, Reggie (Chapter; Peer reviewed, 2010)
    • Invasive cancerous area detection in non-muscle invasive bladder cancer whole slide images 

      Fuster Navarro, Saul; Khoraminia, Farbod; Kiraz, Umay; Kanwal, Neel; Kvikstad, Vebjørn; Eftestøl, Trygve Christian; Zuiverloon, Tahlita C M; Janssen, Emiel; Engan, Kjersti (Chapter, 2022)
      Bladder cancer patients’ stratification into risk groups relies on grade, stage and clinical factors. For non-muscle invasive bladder cancer, T1 tumours that invade the subepithelial tissue are high-risk lesions with a ...
    • The Isolation Concept in the 5G Network Slicing 

      Gonzalez, Andres J.; Ordonez-Lucena, Jose; Helvik, Bjarne Emil; Nencioni, Gianfranco; Xie, Min; Lopez, Diego R.; Grønsund, Pål R. (Chapter, 2020)
      The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be ...
    • Making sense of nonsense : Integrated gradient-based input reduction to improve recall for check-worthy claim detection 

      Sheikhi, Ghazaal; Opdahl, Andreas Lothe; Touileb, Samia; Setty, Vinay (CEUR Workshop Proceedings;, Chapter, 2023)
      Analysing long text documents of political discourse to identify check-worthy claims (claim detection) is known to be an important task in automated fact-checking systems, as it saves the precious time of fact-checkers, ...
    • MigraMEC: Hybrid Testbed for MEC App Migration 

      Wadatkar, Prachi Vinod; Garroppo, Rosario G.; Nencioni, Gianfranco (Chapter, 2023)
      Multi-access Edge Computing (MEC) enhances the capabilities of 5G by enabling the computation closer to the end-user for real-time and context-aware services. One of the main challenges of MEC is the migration of the MEC ...
    • Minimizing the Cost of 5G Network Slice Broker 

      Ali, Gohar; Nencioni, Gianfranco (Chapter, 2021)
      Network slicing is a key enabler of the fifth-generation (5G) of mobile networks. It allows creating multiple logical networks, i.e. network slices, with heterogeneous requirements over a common underlying infrastructure. ...
    • Mitigating non-linear DAC glitches using dither in closed-loop nano-positioning applications 

      Faza, Ahmad Mohammad Ahmad; Leth, John; Eielsen, Arnfinn Aas (American Control COnference (ACC);, Chapter, 2023)
      Digital-to-analog conversion is essential in digital signal processing applications, including closed-loop control schemes. Noise and distortion in digital-to-analog converters result in reduced performance for high-precision ...