Viser treff 301-320 av 389

    • Secure communication in FRTP 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1995-02)
      To ensure privacy, users of the File Repository Transfer Protocol (Frtp) may require that communication partners are properly authenticated. If one partner wants the communication to be crypted, the other must honor the request. This report describes how authentication and privacy are realized. It is shown, by means of an authentication logic, that the protocol achives its goal in this respect.
    • Secure Distributed Storage in Peer to Peer Networks 

      Hanssen, Øyvind (Lecture; Forelesning; Peer reviewed, 2008-02-07)
    • Security in the PASTA project 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1997-02-04)
      This paper presents the system model for the work on security in the Pasta project. We present the objectives of the security effort, the threats we will consider, and those we will not consider. As such, the paper describes the environment which applications must be prepared to face, and still provide users with the desired degree of privacy.
    • Selection of Response Reduction Factor Considering Resilience Aspect 

      Prasanth, S.; Ghosh, Goutam; Gupta, Praveen Kumar; Kumar, Virendra; Paramasivam, Prabhu; Dhanasekaran, Seshathiri (Journal article; Tidsskriftartikkel; Peer reviewed, 2023-02-27)
      The selection of an adequate response reduction factor (R) in the seismic design of a reinforced concrete building is critical to the building’s seismic response. To construct a robust structure, the R factor should be chosen based on the building’s resilience performance. Since no background was provided for the selection of R factors, the study focuses on the right selection of R factors in relation ...
    • A Self-Configuration and Healing Controller To Analyze Misconfigurations of Clusters and IoT Edge Devices 

      Elgazazz, Areeg Samir Ahmed; Dagenborg, Håvard Johansen (Conference object; Konferansebidrag, 2023)
    • A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration At IoT Edge Devices and Containerized Cluster System 

      Elgazazz, Areeg Samir Ahmed; Dagenborg, Håvard (Journal article; Tidsskriftartikkel; Peer reviewed, 2023)
      Securing workloads and information flow against misconfiguration in container-based clusters and edge medical devices is an important part of overall system security. This paper presented a controller that analyzes the misconfiguration, maps the observation to its hidden misconfiguration type, and selects the optimal recovery policy to maximize the performance of defined metrics. In the future, we ...
    • Semi-CNN architecture for effective spatio-temporal Learning in action recognition 

      Leong, Mei Chee; Prasad, Dilip K.; Lee, Yong Tsui; Lin, Feng (Journal article; Tidsskriftartikkel; Peer reviewed, 2020-01-12)
      This paper introduces a fusion convolutional architecture for efficient learning of spatio-temporal features in video action recognition. Unlike 2D convolutional neural networks (CNNs), 3D CNNs can be applied directly on consecutive frames to extract spatio-temporal features. The aim of this work is to fuse the convolution layers from 2D and 3D CNNs to allow temporal encoding with fewer parameters ...
    • Separating mobility from mobile agents 

      Marzullo, Keith; Lauvset, Kåre J.; Johansen, Dag (Research report; Forskningsrapport, 2001-01-16)
      In this paper we argue that the traditional model of a mobile agent provides a poor programming structure. We base our argument on our experience since 1993 in building distributed applications and mobile agent platforms. We have observed that every distributed applications contain three distinct aspects, which we call function, mobility and management. Separating an application into these three ...
    • Shrinkage estimation of rate statistics 

      Holsbø, Einar Jakobsen; Perduca, Vittorio (Journal article; Tidsskriftartikkel; Peer reviewed, 2018-10-08)
      This paper presents a simple shrinkage estimator of rates based on Bayesian methods. Our focus is on crime rates as a motivating example. The estimator shrinks each town’s observed crime rate toward the country-wide average crime rate according to town size. By realistic simulations we confirm that the proposed estimator outperforms the maximum likelihood estimator in terms of global risk. We also ...
    • Single image dehazing for a variety of haze scenarios using back projected pyramid network 

      Singh, Ayush; Bhave, Ajay; Prasad, Dilip K. (Conference object; Konferansebidrag, 2020)
      Learning to dehaze single hazy images, especially using a small training dataset is quite challenging. We propose a novel generative adversarial network architecture for this problem, namely back projected pyramid network (BPPNet), that gives good performance for a variety of challenging haze conditions, including dense haze and inhomogeneous haze. Our architecture incorporates learning of multiple ...
    • Sixteen years of ICPC use in Norwegian primary care : looking through the facts 

      Bassøe, Carl-Fredrik; Botsis, Taxiarchis; Hartvigsen, Gunnar (Journal article; Tidsskriftartikkel; Peer reviewed, 2010)
    • Sleep Monitoring with Wearable Sensor Data in an eCoach Recommendation System: A Conceptual Study with Machine Learning Approach 

      Chatterjee, Ayan; Prinz, Andreas; Pahari, Nibedita; Das, Jishnu; Riegler, Michael (Chapter; Bokkapittel, 2023-04-25)
      The collective effects of sleep loss and sleep disorders are correlated with many adverse health consequences, including increased risk of high blood pressure, obesity, diabetes, depressive state, and cardiovascular symptoms. Research in eHealth can provide methods to enrich personal health care with information and communication technologies (ICTs). An eCoach system may allow people to manage a ...
    • Smart contract formation enabling energy-as-a-service in a virtual power plant 

      Mishra, Sambeet; Crasta, Cletus John; Bordin, Chiara; Mateo-Fornés, Jordi (Journal article; Tidsskriftartikkel; Peer reviewed, 2021-10-22)
      Energy as a service (EaaS) is an emerging business model that enables the otherwise passive energy consumers to play an active role and participate in the energy utility services. This platform is formed through smart contracts registering peer-to-peer (P2P) transactions of energy through price and quantity. Many industries, including finance, have already leveraged smart contracts to introduce ...
    • Smart contract formation enabling energy-as-a-service in a virtual power plant 

      Mishra, Sambeet; John Crasta, Cletus; Bordin, Chiara; Mateo‐Fornés, Jordi (Journal article; Tidsskriftartikkel; Peer reviewed, 2021-10-22)
      Energy as a service (EaaS) is an emerging business model that enables the otherwise passive energy consumers to play an active role and participate in the energy utility services. This platform is formed through smart contracts registering peer-to-peer (P2P) transactions of energy through price and quantity. Many industries, including finance, have already leveraged smart contracts to introduce ...
    • Smart Energy and power systems modelling: an IoT and Cyber-Physical Systems perspective, in the context of Energy Informatics 

      Bordin, Chiara; Håkansson, Anne; Mishra, Sambeet (Journal article; Tidsskriftartikkel; Peer reviewed, 2020-10-02)
      This paper aims at identifying the key role of ”Smart Energy and Power Systems Modelling”, within the context of Energy Informatics. The main objective is to describe how the specific subject of ”Smart Energy and Power Systems Modelling” can give a key contribution within the novel domain of Energy Informatics, by successfully linking and integrating the different disciplines involved. First the ...
    • Social media, physical activity and autism: better or bitter together? A scoping review 

      Gabarron, Elia; Henriksen, André; Nordahl-Hansen, Anders (Journal article; Tidsskriftartikkel; Peer reviewed, 2022-08-22)
      This review provides an overview of the existing research on social media, autism, and physical activity. We searched for publications on PubMed, PsycInfo, Embase, Education source, ERIC, IEEE Xplore, and the proceedings from conferences on health informatics and autism. Eight studies were included in this review. Studies reported mixed results on the link between social media, physical activity, ...
    • SoCodeCNN: Program Source Code for Visual CNN Classification Using Computer Vision Methodology 

      Dey, Somdip; Singh, Amit Kumar; Prasad, Dilip K.; McDonald-Maier, Klaus D. (Journal article; Tidsskriftartikkel; Peer reviewed, 2019-10-24)
      Automated feature extraction from program source-code such that proper computing resources could be allocated to the program is very difficult given the current state of technology. Therefore, conventional methods call for skilled human intervention in order to achieve the task of feature extraction from programs. This research is the first to propose a novel human-inspired approach to automatically ...
    • Some hints on the theory and practice of authentication in distributed systems 

      Stabell-Kulø, Tage; Bottoni, Andrea (Research report; Forskningsrapport, 2003-05-17)
      Authentication in Distributed Systems: Theory and Practice provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of tricky points.
    • Some new restricted maximal operators of Fejér means of Walsh–Fourier series 

      Baramidze, Davit; Baramidze, Lasha; Perssson, Lars-Erik; Tephnadze, George (Journal article; Tidsskriftartikkel; Peer reviewed, 2023-09-12)
    • Sport and Nutrition Digital Analysis: A Legal Assessment 

      Juliussen, Bjørn Aslak; Rui, Jon Petter; Johansen, Dag (Journal article; Tidsskriftartikkel; Peer reviewed, 2023-03-29)
      This paper presents and evaluates legal aspects related to digital technologies applied in the elite soccer domain. Data Protection regulations in Europe clearly indicate that compliance-by-design is needed when developing and deploying such technologies. This is particularly true when health data is involved, but a complicating factor is that the distinction between what is health data or not is ...