Viser treff 401-420 av 625

    • p-SARS: Peer-to-peer search for a recommender system 

      Devik, Rune (Master thesis; Mastergradsoppgave, 2003-12-15)
      WAIF started out in 2002 and the overall goal is to make the computers automatically search for relevant information based on the user’s preferences, and to push this information directly to the user wherever he/she is and to whatever device he/she has available. In other words, make the machines serve us, with as little human interaction as possible. This thesis focuses on a specific part of this ...
    • Parallelization of the Alternating-Least-Squares Algorithm With Weighted Regularization for Efficient GPU Execution in Recommender Systems 

      Kampffmeyer, Michael Christian (Master thesis; Mastergradsoppgave, 2015-06-15)
      Collaborative filtering recommender systems have become essential to many Internet services, providing, for instance, book recommendations at Amazon's online e-commerce service, music recommendation in Spotify and movie recommendation in Netflix. Matrix factorization and Restricted Boltzmann Machines (RBMs) are two popular methods for implementing recommender systems, both providing superior ...
    • Parid-GO A Personalised Augmented Reality Game to Reinforce Outdoor Physical Activity for People with Intellectual Disabilities 

      Sivakumar, Keerthana (Mastergradsoppgave; Master thesis, 2023-09-11)
      Parid-GO A Personalised Augmented Reality Game to Reinforce Outdoor Physical Activity for People with Intellectual Disabilities. This project aims to develope a dynamic content solution that are user centric. The rationale is that by allowing the participants to customize and use other themes, colors, etc., the participant will be more engaged and use the application more. Which in turn will increase ...
    • Particular: A Functional Approach to 3D Particle Simulation 

      Indreberg, Marius (Master thesis; Mastergradsoppgave, 2021-05-31)
      Simulating large bodies of entities in various environments is an old science that traces back decades in computer science. There are existing software frameworks with well built mathematical models for approximating various environments. These frameworks are however built on imperative programming fundamentals often following a object oriented paradigm. This thesis presents Particular a 3d ...
    • Pedagogical Perspectives of Interdisciplinary Teaching and Research: An Energy System Modelling Outlook in Relation to Energy Informatics 

      Bordin, Chiara; Mishra, Sambeet; Benth, Fred Espen (Journal article; Tidsskriftartikkel; Peer reviewed, 2023-08-02)
      The purpose of this paper is to present and discuss pedagogical frameworks and approaches to developing, delivering, and evaluating a new interdisciplinary course within the domain of energy informatics at both Master’s and PhD levels. This study is needed because many papers on sustainable energy engineering education concentrate on course content but provide very little information on the ...
    • Peer Observations of Observation Units 

      Stormoen, Camilla (Master thesis; Mastergradsoppgave, 2018-06-01)
      The Arctic Tundra in the far northern hemisphere is one of ecosystems that are most affected by the climate changes in the world today. Five Fram Center institutions developed a long-term research project called Climate-ecological Observatory for Arctic Tundra (COAT). Their goal is to create robust observation systems which enable documentation and understanding of climate change impacts on the ...
    • Performance experiments with the Storm View Distributed Parallel Volume Renderer. 

      Asplin, Jo; Johansen, Dag (Research report; Forskningsrapport, 1995-06)
      Volume rendering is a useful but cpu-intensive method for visualizing large scalar fields. The time to render a single image may be reduced by parallel processing. This paper reports on performance experiments with the StormView volume renderer, which is parallelized on a set of 57 MIPS / 17 MFLOPS workstations connected by a 10 Mbps Ethernet. For certain user patterns, we show that our parallelization ...
    • Performance isolation and adaption in the Vortex Kernel 

      Kvalnes, Aage; Renesse, Robbert van; Johansen, Dag (Research report; Forskningsrapport, 2003-01-10)
      Vortex is a new multiprocessor operating system kernel intended for emerging Internet service applications. The architecture is based on SEDA's staged computational model. Vortex provides mechanisms for performance isolation and dynamic adaptation. Performance results validate that the resource control mechanisms of Vortex are effective, and that Vortex significantly outperforms Linux on single-threaded ...
    • Performance of data enhancements and training optimization for neural network: A polyp detection case study 

      Henriksen, Fredrik Lund; Jensen, Rune; Stensland, Håkon Kvale; Johansen, Dag; Riegler, Michael; Halvorsen, Pål (Journal article; Tidsskriftartikkel; Peer reviewed, 2019-08-05)
      Deep learning using neural networks is becoming more and more popular. It is frequently used in areas like video analysis, image retrieval, traffic forecast and speech recognition. In this respect, the learning and training process usually requires a lot of data. However, in many areas, data is scarce which is definitely the case in our medical application scenario, i.e., polyp detection in the ...
    • Performance optimization and modeling of fine-grained irregular communication in UPC 

      Lagraviere, Jeremie Alexandre Emilien; Langguth, Johannes; Prugger, Martina; Einkemmer, Lukas; Ha, Hoai Phuong; Cai, Xing (Journal article; Tidsskriftartikkel; Peer reviewed, 2019-03-03)
      The Unified Parallel C (UPC) programming language offers parallelism via logically partitioned shared memory, which typically spans physically disjoint memory subsystems. One convenient feature of UPC is its ability to automatically execute between-thread data movement, such that the entire content of a shared data array appears to be freely accessible by all the threads. The programmer friendliness, ...
    • Performance principles for trusted computing with intel SGX 

      Gjerdrum, Anders Tungeland; Pettersen, Robert; Johansen, Håvard D.; Johansen, Dag (Journal article; Tidsskriftartikkel; Peer reviewed, 2018-07-14)
      Cloud providers offering Software-as-a-Service (SaaS) are increasingly being trusted by customers to store sensitive data. Companies often monetize such personal data through curation and analysis, providing customers with personalized application experiences and targeted advertisements. Personal data is often accompanied by strict privacy and security policies, requiring data processing to be ...
    • Personalized Nudges with Edge Computing 

      Andersen, Elisabeth Sie (Mastergradsoppgave; Master thesis, 2022-05-02)
      This thesis aims to investigate the role of edge computing in a smart nudging system. A smart nudging system has requirements for efficient data processing of personal and context-aware data from heterogeneous sources. Furthermore, a smart nudging system needs to protect and preserve the privacy of data within the system. Edge computing has been proposed as a computing paradigm in a smart nudging ...
    • Pesto flavoured security 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2002-05)
      Pesto aims at providing highly available and secure storage for longlived data to mobile users roaming into untrusted environments. Security in Pesto encompasses the following three aspects: availability, safety, and privacy. A mechanism supporting one aspect may adversely affect another. For example, replication may increase availability but complicates supporting confidentiality, and simply ...
    • The Pesto project. Goals and motivation 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2001-06)
      Pesto is a storage system geared towards a computing model where private machines play a pivotal role. Sharing of data is crucial, both between partners, and between the many devices owned by individual users. Replication is the only sensible means to provide ubiquitous access to private data. However, without provisions, replication endangers privacy by enlarging the Trusted Computing Base. The ...
    • Photoperiod-dependent developmental reprogramming of the transcriptional response to seawater entry in Atlantic salmon (Salmo salar) 

      Iversen, Marianne; Mulugeta, Teshome Dagne; West, Alexander Christopher; Jørgensen, Even Hjalmar; Martin, Samuel A. M.; Sandve, Simen Rød; Hazlerigg, David (Journal article; Tidsskriftartikkel; Peer reviewed, 2021-03-12)
      The developmental transition of juvenile salmon from a freshwater resident morph (parr) to a seawater (SW) migratory morph (smolt), known as smoltification, entails a reorganization of gill function to cope with the altered water environment. Recently, we used RNAseq to characterize the breadth of transcriptional change which takes place in the gill in the FW phase of smoltification. This highlighted ...
    • Physicians Interrupted by Mobile Devices in Hospitals: Understanding the Interaction Between Devices, Roles, and Duties 

      Solvoll, Terje; Scholl, Jeremiah; Hartvigsen, Gunnar (Journal article; Tidsskriftartikkel; Peer reviewed, 2013)
      A common denominator of modern hospitals is a variety of communication problems. In particular, interruptions from mobile communication devices are a cause of great concern for many physicians. Objective: To characterize how interruptions from mobile devices disturb physicians in their daily work. The gathered knowledge will be subsequently used as input for the design and development of a ...
    • Physics-Guided Loss Functions Improve Deep Learning Performance in Inverse Scattering 

      Liu, Zicheng; Roy, Mayank; Prasad, Dilip K.; Agarwal, Krishna (Journal article; Tidsskriftartikkel; Peer reviewed, 2022-03-15)
      Solving electromagnetic inverse scattering problems (ISPs) is challenging due to the intrinsic nonlinearity, ill-posedness, and expensive computational cost. Recently, deep neural network (DNN) techniques have been successfully applied on ISPs and shown potential of superior imaging over conventional methods. In this paper, we discuss techniques for effective incorporation of important physical ...
    • PKI and high-level security programming abstractions for SNOOP 

      Stenhaug, Håkon (Master thesis; Mastergradsoppgave, 2019-12-15)
      When working with sensitive data in a distributed setting, secure multi-partycomputations(SMC) protocols aims to preserve the privacy of participants. Acore aspect of any SMC protocol is secure communication between participants.Based on the NOOP and SNOOP middleware with a combination of secret keyand public-key cryptography we design and implement a public key infrastruc-ture(PKI) to share signed ...
    • Polar Vantage and Oura Physical Activity and Sleep Trackers: Validation and Comparison Study 

      Henriksen, André; Grimsgaard, Sameline; Hartvigsen, Gunnar; Hopstock, Laila Arnesdatter (Journal article; Tidsskriftartikkel; Peer reviewed, 2022-05-27)
      Background: Consumer-based activity trackers are increasingly used in research, as they have the potential to promote increased physical activity and can be used for estimating physical activity among participants. However, the accuracy of newer consumer-based devices is mostly unknown, and validation studies are needed.<p> <p>Objective: The objective of this study was to compare the Polar Vantage ...
    • Policies and metrics for fair resource sharing 

      Renesse, Robbert van; Kvalnes, Aage; Zagorodnov, Dmitrii; Johansen, Dag (Research report; Forskningsrapport, 2006)
      Performance isolation is essential to operating systems shared by dependable services. Unfortunately, most such systems, including real-time operating systems and VMMs, only fairly divide and account for CPU cycles. We submit that dependable services require specifying and enforcing policies for all resources, and that current metrics for evaluating fair sharing are insufficient. This paper proposes ...