Viser treff 482-501 av 625

    • Safe and secure outsourced computing with fully homomorphic encryption and trusted execution environments 

      Singh, Isak Sunde (Master thesis; Mastergradsoppgave, 2020-06-30)
      Increases in data production and growing demands for more computing power leads to the current trend of outsourcing data and computation services to cloud providers. With data breaches and cases of data misuse becoming increasingly common, there is a high demand for secure systems. This, however, conflicts with the current data trust models. A solution to this that is becoming more common is the use ...
    • Safe Learning for Control using Control Lyapunov Functions and Control Barrier Functions: A Review 

      Sadanandan Anand, Akhil; Seel, Katrine; Gjærum, Vilde Benoni; Håkansson, Anne; Robinson, Haakon; Saad, Aya (Journal article; Tidsskriftartikkel; Peer reviewed, 2021-10-01)
      Real-world autonomous systems are often controlled using conventional model-based control methods. But if accurate models of a system are not available, these methods may be unsuitable. For many safety-critical systems, such as robotic systems, a model of the system and a control strategy may be learned using data. When applying learning to safety-critical systems, guaranteeing safety during learning ...
    • Satellite communication applied in a distributed application 

      Farstad, Werner; Johansen, Dag; Hartvigsen, Gunnar (Research report; Forskningsrapport, 1994-12)
      The paper describes the development of a prototype application for access to vital weather information from the Northern Atlantic sea region. The application gives meteorologists access to weather observations measured on sea vessels. Today the available information is very limited. On a daily basis, only 4-5 weather observations in the whole arctic sea-region are conducted. It is therefore suggested ...
    • Sáhka 

      Hilbertsen, Markus Bergum (Mastergradsoppgave; Master thesis, 2022-05-25)
      Elite football today is infused with technologies for collecting data on players' performance and health. Technologies such as wearable health and fitness trackers, full-body medical scans, and positional systems mounted around a stadium give coaches a wide range of accurate data about their players. However, coaches do not have the time or ability to analyze all this data for each player to give ...
    • Scalability of Distributed Version Control Systems 

      Murphy, Mike; Bjørndalen, John Markus; Anshus, Otto (Journal article; Tidsskriftartikkel, 2017-11-26)
      <p>Distributed version control systems are popular for storing source code, but they are notoriously ill suited for storing large binary files. <p>We report on the results from a set of experiments designed to characterize the behavior of some widely used distributed version control systems with respect to scaling. The experiments measured commit times and repository sizes when storing single files ...
    • Scalable exploration of population-scale drug consumption data 

      Skar, Tengel Ekrem (Master thesis; Mastergradsoppgave, 2019-06-01)
      The potential for knowledge discovery is currently underutilized on pharmacoepidemiologic data sets. A big dataset enables finding and assessing rare drug consumption patterns that are associated with adverse drug reactions causing hospitalization, or death. To enable such exploration of big pharmacoepidemiology data, four key issues need so be addressed. First, to ingest, transform, preprocess ...
    • A scalable, interactive widget library for visualizing biological data 

      Johansen, Terje Andre (Master thesis; Mastergradsoppgave, 2011-06)
      In biology the introduction next generation technology is increasing the amount of data generated rapidly. New sequencing machines are able to produce terabytes of genomic data in days and in later years the cost of storing data has become higher than to produce it. With enormous amounts of data arrives great opportunities, but also new challenges; how should biologists analyze and interpret the ...
    • Schema crawled API documentation exploration 

      Bakkeli, Nicolai (Master thesis; Mastergradsoppgave, 2017-12-15)
      Åpne API blir stadig mer utbredt som fører til at utviklere kan benytte mye tid i å lese dokumentasjon for å finne et passende alternativ. Tesen beskriver en design som kan benyttes for å danne et sett med hjelpemidler som har til hensikt å redusere unødvendige alternativ av API for brukeren. Dette gjøres via en web crawler som går gjennom API dokumentasjon samt en behandler av datamengdene som ...
    • ScopeSense: An 8.5-Month Sport, Nutrition, and Lifestyle Lifelogging Dataset 

      Riegler, Michael Alexander; Thambawita, Vajira; Chatterjee, Ayan; Nguyen, Thu; Hicks, Steven; Telle-Hansen, Vibeke; Pettersen, Svein Arne; Johansen, Dag; Jain, Ramesh; Halvorsen, Pål (Chapter; Bokkapittel, 2023-03-29)
      Nowadays, most people have a smartphone that can track their everyday activities. Furthermore, a significant number of people wear advanced smartwatches to track several vital biomarkers in addition to activity data. However, it is still unclear how these data can actually be used to improve certain aspects of people’s lives. One of the key challenges is that the collected data is often massive and ...
    • Seadrive. Remote file synchronization for offshore fleets 

      Haro, Peter Halland (Master thesis; Mastergradsoppgave, 2016-06-01)
      File synchronization- and hosting services is not only an integrated service in everyday life, but also a powerful tool to support business and organizational activities. In order to provide users with a transparent experience, the systems relies on sophisticated mechanisms to create a seamless integration. The problem with these systems is that they are designed for stable network connections with ...
    • Search-based composition, streaming and playback of video archive content 

      Johansen, Dag; Halvorsen, Pål; Johansen, Håvard; Riiser, Haakon; Gurrin, Cathal; Olstad, Bjørn; Griwodz, Carsten; Kvalnes, Åge; Hurley, Joseph; Kupka, Tomas (Journal article; Tidsskriftartikkel; Peer reviewed, 2011)
      Locating content in existing video archives is both a time and bandwidth consuming process since users might have to download and manually watch large portions of superfluous videos. In this paper, we present two novel prototypes using an Internet based video composition and streaming system with a keyword-based search interface that collects, converts, analyses, indexes, and ranks video content. ...
    • Secure and scalable statistical computation of questionnaire data in R 

      Yigzaw, Kassaye Yitbarek; Michalas, Antonis; Bellika, Johan Gustav (Journal article; Tidsskriftartikkel; Peer reviewed, 2016-08-12)
      Collecting data via a questionnaire and analyzing them while preserving respondents' privacy may increase the number of respondents and the truthfulness of their responses. It may also reduce the systematic differences between respondents and non-respondents. In this paper, we propose a privacy- preserving method for collecting and analyzing survey responses using secure multi-party computation. The ...
    • Secure collection of physical activity data from study participants through mobile solutions 

      Fenes, Markus Madsen (Mastergradsoppgave; Master thesis, 2023-06-30)
      Biometric and health related data collected through automated features in smartphones and wearables can provide researchers with valuable information about the population. This thesis explores the possibilities of extracting data from Apple and Samsung wearable devices like watches and smartphones where native built-in support for data extraction and third-party data storage is not available. Doing ...
    • Secure communication in FRTP 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1995-02)
      To ensure privacy, users of the File Repository Transfer Protocol (Frtp) may require that communication partners are properly authenticated. If one partner wants the communication to be crypted, the other must honor the request. This report describes how authentication and privacy are realized. It is shown, by means of an authentication logic, that the protocol achives its goal in this respect.
    • Secure Distributed Storage in Peer to Peer Networks 

      Hanssen, Øyvind (Lecture; Forelesning; Peer reviewed, 2008-02-07)
    • SecureCached. Secure caching with the Diggi framework. 

      Hoff, Helge (Master thesis; Mastergradsoppgave, 2018-06-01)
      Caching services are vital for the performance of large-scale web services running in the cloud. However, placing sensitive data in caching services, implicitly includes all components of the cloud infrastructure that can be exploited. Therefore, end-users place their trust in the entire security stack of their service providers. In order to achieve confidentiality and integrity of sensitive ...
    • Securing private peer-to-peer networks 

      Fredriksen, Lars A. (Master thesis; Mastergradsoppgave, 2007-08-15)
      This thesis describes the research of grading security in private Peer-to-Peer (P2P) networks, and ultimately the development of “The Socialized.Net Embedded – Cryptography Version” (Tsnecv). Tsnecv is a revision of “The Socialized.Net Embedded” (Tsne) which is the embedded version of Njål Borch’s doctorate “The Socialized.Net”. Tsne is a P2P file sharing application which builds it private P2P ...
    • Security in the PASTA project 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1997-02-04)
      This paper presents the system model for the work on security in the Pasta project. We present the objectives of the security effort, the threats we will consider, and those we will not consider. As such, the paper describes the environment which applications must be prepared to face, and still provide users with the desired degree of privacy.
    • Selection of Response Reduction Factor Considering Resilience Aspect 

      Prasanth, S.; Ghosh, Goutam; Gupta, Praveen Kumar; Kumar, Virendra; Paramasivam, Prabhu; Dhanasekaran, Seshathiri (Journal article; Tidsskriftartikkel; Peer reviewed, 2023-02-27)
      The selection of an adequate response reduction factor (R) in the seismic design of a reinforced concrete building is critical to the building’s seismic response. To construct a robust structure, the R factor should be chosen based on the building’s resilience performance. Since no background was provided for the selection of R factors, the study focuses on the right selection of R factors in relation ...
    • A Self-Configuration and Healing Controller To Analyze Misconfigurations of Clusters and IoT Edge Devices 

      Elgazazz, Areeg Samir Ahmed; Dagenborg, Håvard Johansen (Conference object; Konferansebidrag, 2023)