Now showing items 1-20 of 56

    • Fog Computing for Realizing Smart Neighborhoods in Smart Grids 

      Jaiswal, Rituka; Davidrajuh, Reggie; Chunming, Rong (Peer reviewed; Journal article, 2020-09)
      Cloud Computing provides on-demand computing services like software, networking, storage, analytics, and intelligence over the Internet (“the cloud”). But it is facing challenges because of the explosion of the Internet ...
    • Single Controller-Based Colored Petri Nets for Deadlock Control in Automated Manufacturing Systems 

      Kaid, Husam; Li, Zhiwu; Davidrajuh, Reggie (Peer reviewed; Journal article, 2020-01)
      Deadlock control approaches based on Petri nets are usually implemented by adding control places and related arcs to the Petri net model of a system. The main disadvantage of the existing policies is that many control ...
    • 5G Network Slicing: A Security Overview 

      Olimid, Ruxandra; Nencioni, Gianfranco (Peer reviewed; Journal article, 2020-05)
      The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G's ...
    • Methods for preprocessing time and distance series data from personal monitoring devices 

      Wiktorski, Tomasz; Bjørkavoll-Bergseth, Magnus; Ørn, Stein (Peer reviewed; Journal article, 2020-06)
      There is a need to develop more advanced tools to improve guidance on physical exercise to reduce risk of adverse events and improve benefits of exercise. Vast amounts of data are generated continuously by Personal Monitoring ...
    • Visualization of generic utility of sequential patterns 

      Wiktorski, Tomasz; Królak, Aleksandra; Rosińska, Karolina; Strumillo, Pawel; Lin, Jerry Chun-Wei (Peer reviewed; Journal article, 2020-05)
      Most of the literature on utility pattern mining (UPM) assumes that the particular patterns' utility in known in advance. Concurrently, in frequent pattern mining (FPM) it is assumed that all patterns take the same value. ...
    • CCNA-Based Communication Technology Courses 

      Nencioni, Gianfranco; Kårstad, Terje Per (Peer reviewed; Journal article, 2020-04)
      Many study programs include courses on communication technology. All these courses explain the basis of communication technology, but they have different levels of detail depending on the study program and the related ...
    • Automated test case generation for the Paxos single-decree protocol using a Coloured Petri Net model 

      Wang, Rui; Kristensen, Lars Michael; Meling, Hein; Stolz, Volker (Peer reviewed; Journal article, 2019-04)
      Implementing test suites for distributed software systems is a complex and time-consuming task due to the number of test cases that need to be considered in order to obtain high coverage. We show how a formal Coloured Petri ...
    • Automated test case generation for the Paxos single-decree protocol using a Coloured Petri Net model 

      Wang, Rui; Kristensen, Lars Michael; Meling, Hein; Stolz, Volker (Peer reviewed; Journal article, 2019-04)
      Implementing test suites for distributed software systems is a complex and time-consuming task due to the number of test cases that need to be considered in order to obtain high coverage. We show how a formal Coloured Petri ...
    • A Novel Approach to Data Extraction on Hyperlinked Webpages 

      Shaukat, Kamran; Masood, Nayyer; Khushi, Matloob (Journal article; Peer reviewed, 2019-11)
      The World Wide Web has an enormous amount of useful data presented as HTML tables. These tables are often linked to other web pages, providing further detailed information to certain attribute values. Extracting schema of ...
    • A Widespread Review of Smart Grids Towards Smart Cities 

      Farmanbar, Mina; Parham, Kiyan; Arild, Øystein; Chunming, Rong (Journal article; Peer reviewed, 2019-11)
      Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ...
    • A Widespread Review of Smart Grids Towards Smart Cities 

      Farmanbar, Mina; Parham, Kiyan; Arild, Øystein; Rong, Chunming (Journal article; Peer reviewed, 2019-11)
      Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ...
    • Mixed convolutional and long short-term memory network for the detection of lethal ventricular arrhythmia 

      Picon, Artzai; Irusta, Unai; Alvarez-Gila, Aitor; Aramendi, Elisabete; Alonso-Atienza, Felipe; Figuera, Carlos; Ayala, Unai; Garrote, Estibaliz; Wik, Lars; Kramer-Johansen, Jo; Eftestøl, Trygve Christian (Journal article; Peer reviewed, 2019-05)
      Early defibrillation by an automated external defibrillator (AED) is key for the survival of out-of-hospital cardiac arrest (OHCA) patients. ECG feature extraction and machine learning have been successfully used to detect ...
    • Automatic Estimation of Coronary Blood Flow Velocity Step 1 for Developing a Tool to Diagnose Patients With Micro-Vascular Angina Pectoris 

      Khanmohammadi, Mahdieh; Sæland, Charlotte; Engan, Kjersti; Eftestøl, Trygve Christian; Larsen, Alf Inge (Journal article; Peer reviewed, 2019-01)
      Aim: Our aim was to automatically estimate the blood velocity in coronary arteries using cine X-ray angiographic sequence. Estimating the coronary blood velocity is a key approach in investigating patients with angina ...
    • Dependability of the NFV Orchestrator: State of the Art and Research Challenges 

      Gonzalez, Andres Javier; Nencioni, Gianfranco; Kamisinski, Andrzej; Helvik, Bjarne Emil; Heegaard, Poul Einar (Journal article; Peer reviewed, 2018)
      The introduction of network function virtualisation (NFV) represents a significant change in networking technology, which may create new opportunities in terms of cost efficiency, operations, and service provisioning. Although ...
    • Entity-Oriented Search 

      Balog, Krisztian (The Information Retrieval Series;39, Book, 2018)
      Search engines have become part of our daily lives. We use Google (Bing, Yandex, Baidu, etc.) as the main gateway to find information on theWeb.With a certain type of content in mind, we may search directly on a particular ...
    • Security Incident Information Exchange for Cloud Service Provisioning Chains 

      Frøystad, Christian; Tøndel, Inger Anne; Jaatun, Martin Gilje (Journal article; Peer reviewed, 2018-12)
      Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about ...
    • Orchestration and Control in Software-Defined 5G Networks: Research Challenges 

      Nencioni, Gianfranco; Garroppo, Rosario G.; Gonzalez, Andres J.; Helvik, Bjarne Emil; Procissi, Gregorio (Journal article; Peer reviewed, 2018-08)
      The fifth generation (5G) of cellular networks promises to be a major step in the evolution of wireless technology. 5G is planned to be used in a very broad set of application scenarios. These scenarios have strict ...
    • Risk in the Age of Software Security 

      Jaatun, Martin Gilje (Others, 2017)
      For general applications, it is way too costly to aim for 100 % secure software; for complex systems it may even be impossible. To achieve effective software security at reasonable cost, it is thus necessary to identify ...
    • Accountability Requirements in the Cloud Provider Chain 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Journal article; Peer reviewed, 2018-04)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ...
    • Frå transistor til datamaskin 

      Tengesdal, Morten (Notater fra Universitetet i Stavanger;39, Report, 2018-04)
      Dette skrivet prøver å gi ei forståing av korleis datamaskinar er oppbygde og virkar. Ein ser også på korleis ein kan programmera mindre datamaskinar brukte til styring og overvaking av prosessar. Skrivet er laga for bruk ...