Browsing Department of Informatics by Title
Now showing items 120 of 326

A 43k Kernel for Planar Dominating Set using ComputerAided Reduction Rule Discovery
(The University of Bergen, 20160215)In this thesis we explore the technique of Region Decomposition for finding kernels for Planar Dominating Set. We redefine some concepts used in earlier work, fixing some ambiguities on the way. From those concepts we ...Master thesis 
Abstractions for LanguageIndependent Program Transformations
(The University of Bergen, 20070627)Doctoral thesis 
Additive Schwarz preconditioner for the finite volume element discretization of symmetric elliptic problems
(Springer Netherlands, 20150925)A symmetric and a nonsymmetric variant of the additive Schwarz preconditioner are proposed for the solution of a class of finite volume element discretization of the symmetric elliptic problem in two dimensions, with large ...Journal article 
Algorithms for Linearly Ordered Boolean Formulas
(The University of Bergen, 20160630)This thesis considers a class of propositional boolean formulas on which various problems related to satisfiability are efficiently solvable by a dynamic programming algorithm. It mainly consists of two larger parts: the ...Master thesis 
Aligning a Splice Graph to a Genomic Sequence
(The University of Bergen, 20050601)Master thesis 
Analysis of Trivium Using Compressed Right Hand Side Equations
(Springer Berlin Heidelberg, 2012)We study a new representation of nonlinear multivariate equations for algebraic cryptanalysis. Using a combination of multiple right hand side equations and binary decision diagrams, our new representation allows a ...Peer reviewedChapter 
Approximating Acyclicity Parameters of Sparse Hypergraphs
(Dagstuhl Publishing, 2009)The notions of hypertree width and generalized hypertree width were introduced by Gottlob, Leone, and Scarcello (PODS'99, PODS'01) in order to extend the concept of hypergraph acyclicity. These notions were further generalized ...Conference object 
Assessing and Mitigating Risks in Computer Systems
(The University of Bergen, 20080926)When it comes to nontrivial networked computer systems, bulletproof security is very hard to achieve. Over a system's lifetime new security risks are likely to emerge from e.g. newly discovered classes of vulnerabilities ...Doctoral thesis 
Automatic Differentiation of Third Order Derivatives using Forward Mode in C++
(The University of Bergen, 20090107)Automatic differentiation of third order derivatives is implemented in C++. The implementation uses uses objectorientation and operator overloading to perform the differentiation. A short introduction to operator ...Master thesis 
AxiomBased Transformations: Optimisation and Testing
(Elsevier, 20091010)Programmers typically have knowledge about properties of their programs that aren't explicitly expressed in the code properties that may be very useful for, e.g., compiler optimisation and automated testing. Although ...Journal article 
Axis patterning by BMPs: cnidarian network reveals evolutionary constraints
(Elsevier, 201503)BMP signaling plays a crucial role in the establishment of the dorsoventral body axis in bilaterally symmetric animals. However, the topologies of the bone morphogenetic protein (BMP) signaling networks vary drastically ...Journal article 
Bchromatic number: Beyond NPhardness
(Dagstuhl Publishing, 2015)The bchromatic number of a graph G, chi_b(G), is the largest integer k such that G has a kvertex coloring with the property that each color class has a vertex which is adjacent to at least one vertex in each of the other ...Conference object 
Beyond the question of fixedparameter tractability
(The University of Bergen, 20170106)Multivariate complexity is a prominent field that over the last decades has developed a rich toolbox, not only to tackle seemingly intractable problems, but also to describe the boundaries of tractability in a richer and ...Doctoral thesis 
Binding Leverage as a Molecular Basis for Allosteric Regulation
(Public Library of Science, 20110915)Allosteric regulation involves conformational transitions or fluctuations between a few closely related states, caused by the binding of effector molecules. We introduce a quantity called binding leverage that measures ...Peer reviewedJournal article 
BioHackathon series in 2011 and 2012: penetration of ontology and linked data in life science domains
(BioMed Central, 20140205)Abstract The application of semantic technologies to the integration of biological data and the interoperability of bioinformatics analysis and visualization tools has been the common theme of a series of annual ...Journal article 
BioXSD: the common dataexchange format for everyday bioinformatics web services
(Oxford University Press, 2010)Motivation: The worldwide community of life scientists has access to a large number of public bioinformatics databases and tools, which are developed and deployed using diverse technologies and designs. More and more of ...Journal article 
Blind search for posttranslational modifications and amino acid substitutions using peptide mass fingerprints from two proteases
(BioMed Central, 20081219)Background: Mass spectrometric analysis of peptides is an essential part of protein identification and characterization, the latter meaning the identification of modifications and amino acid substitutions. There are two ...Journal articlePeer reviewed 
Building Trust in Remote Internet Voting
(The University of Bergen, 20100527)During the past decades, a lot of research has been done to create voting protocols and election systems that facilitate voting via the Internet. Many universities and private organizations are now using such systems for ...Master thesis 
Case Studies in Constructive Mathematics
(The University of Bergen, 20160122)The common theme in this thesis is the study of constructive provability: in particular we investigate aspects of ﬁnite sets and Kan simplicial sets from a constructive perspective. There are numerous deﬁnitions of ...Doctoral thesis 
CCZequivalence of bent vectorial functions and related constructions
(Springer, 20110106)We observe that the CCZequivalence of bent vectorial functions over F2nFn2 (n even) reduces to their EAequivalence. Then we show that in spite of this fact, CCZequivalence can be used for constructing bent functions ...Peer reviewedJournal article