Now showing items 205-224 of 273

  • Salmon louse (Lepeophtheirus salmonis) transcriptomes during post molting maturation and egg production, revealed using EST-sequencing and microarray analysis 

    Eichner, Christiane; Frost, Petter; Dysvik, Bjarte; Jonassen, Inge; Kristiansen, Bjørn; Nilsen, Frank (BioMed Central, 2008-03-10)
    Background Lepeophtheirus salmonis is an ectoparasitic copepod feeding on skin, mucus and blood from salmonid hosts. Initial analysis of EST sequences from pre adult and adult stages of L. salmonis revealed a large ...
    Peer reviewedJournal article
  • Scaling the scales - A suggested improvement to IBM's Intelligent Recommendation Algorithm 

    Myrtveit, Magnar (The University of Bergen, 2014-11-20)
    Recommender systems appear in a large variety of applications, and their use has become very common in recent years. As a lot of money can be made by companies having a better recommender system than their competitors, ...
    Master thesis
  • The Second Rewrite Engines Competition 

    Durán, Francisco; Roldán, Manuel; Balland, Emilie; van den Brand, Mark; Eker, Steven; Kalleberg, Karl Trygve; Kats, Lennart C. L.; Moreau, Pierre-Etienne; Schevchenko, Ruslan; Visser, Eelco (Elsevier, 2009-06-29)
    The Second Rewrite Engines Competition (REC) was celebrated as part of the 7th Workshop on Rewriting Logic and its Applications (WRLA 2008). In this edition of the competition participated five systems, namely ASF+SDF, ...
    Journal article
  • Security analysis of electronic voting and online banking systems 

    Tjøstheim, Thomas (The University of Bergen, 2007-08-29)
    The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, ...
    Doctoral thesis
  • Security Analysis Of Lightweight Schemes for RFID Systems 

    Abyaneh, Mohammad Reza Sohizadeh (The University of Bergen, 2012-08-08)
    This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ...
    Doctoral thesis
  • Security Analysis of two Distance-Bounding Protocols 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestima ...
    Conference object
  • Security API for Java ME: secureXdata 

    Valvik, Remi André Bognøy (The University of Bergen, 2012-02-24)
    The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ...
    Master thesis
  • The Seismic Analyzer: Interpreting and Illustrating 2D Seismic Data 

    Patel, Daniel; Giertsen, Christopher; Thurmond, John; Gjelberg, John; Gröller, Eduard (IEEE Computer Society, 2008)
    We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify ...
    Journal articlePeer reviewed
  • Self-stabilizing algorithms for the distance-k coloring problem 

    Wang, Shuang (The University of Bergen, 2008-11-10)
    Many problems of practical interest can be modeled as coloring problems. For example, when you are making a phone call using a mobile phone, it needs to transform the voice signal into an electronic wireless signal. Eachsuch ...
    Master thesis
  • Selvstabiliserende algoritmer for frekvensallokering 

    Solem, Tom Martens Meyer (The University of Bergen, 2004)
    Master thesis
  • Separating Exceptional Concerns 

    Bagge, Anya Helene (IEEE, 2012)
    Traditional error handling mechanisms, including exceptions, have several weaknesses that interfere with maintainability, flexibility and genericity in software: Error code is tangled with normal code; reporting is ...
  • Sequences and Linear Codes from Highly Nonlinear Functions 

    Li, Chunlei (The University of Bergen, 2014-06-16)
    Due to optimal nonlinearity and differential uniformity, perfect nonlinear (PN) and almost perfect nonlinear (APN) functions are of great importance in cryptography. It is interesting that they also define optimal objects ...
    Doctoral thesis
  • The SHIP Validator: An Annotation-based Content-Validation Framework for Java Applications 

    Mancini, Federico; Hovland, Dag; Mughal, Khalid A. (IEEE, 2010)
    In this paper, we investigate the use of Java annotations for software security purposes. In particular, we implement a framework for content validation where the validation tests are specified by annotations. This ...
    Peer reviewedConference object
  • Similarity-based Exploded Views 

    Ruiz, Marc; Viola, Ivan; Boada, Imma; Bruckner, Stefan; Feixas, Miquel; Sbert, Mateu (Springer, 2008)
    Exploded views are often used in illustration to overcome the problem of occlusion when depicting complex structures. In this paper, we propose a volume visualization technique inspired by exploded views that partitions ...
    ChapterPeer reviewed
  • A simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB 

    Rayner, Tim F.; Rocca-Serra, Philippe; Spellman, Paul T.; Causton, Helen C.; Farne, Anna; Holloway, Ele; Irizarry, Rafael A.; Liu, Junmin; Maier, Donald S.; Miller, Michael; Petersen, Kjell; Quackenbush, John; Sherlock, Gavin; Stoeckert, Christian J. Jr; White, Joseph; Whetzel, Patricia L.; Wymore, Farrell; Parkinson, Helen; Sarkans, Ugis; Ball, Catherine A.; Brazma, Alvis (BioMed Central, 2006-11-06)
    Background: Sharing of microarray data within the research community has been greatly facilitated by the development of the disclosure and communication standards MIAME and MAGEML by the MGED Society. However, the ...
    Journal article
  • Simplified Computer Interaction Using Mixed Reality 

    Balabanian, Jean-Paul (The University of Bergen, 2004)
    This thesis describes a system for mixing reality, as captured by a camera, with a virtual 3-dimensional world. A system to recognize and track a square pattern of markers is created in order to obtain the extrinsic ...
    Master thesis
  • Skaping av meirverdi gjennom opne data om kollektivtrafikk 

    Bergheim, Livar (The University of Bergen, 2015-05-04)
    Tema i denne oppgåva er opne data, med ei avgrensing mot kollektivtrafikkdata. Djupnestudien er retta mot verksemda til Skyss, det fylkeskommunale kollektivtrafikkselskapet i Hordaland. Omgrepet opne data" inneber ...
    Master thesis
  • Sketch-based Modelling and Conceptual Visualization of Geomorphological Processes for Interactive Scientific Communication 

    Natali, Mattia (The University of Bergen, 2014-09-19)
    Throughout this dissertation, solutions for rapid digitalization of ideas will be defined. More precisely, the focus is on interactive scientific sketching and communication of geology, where the result is a digital ...
    Doctoral thesis
  • Sketch-based Storytelling for Cognitive Problem Solving: Externalization, Evaluation, and Communication in Geology 

    Lidal, Endre Mølster (The University of Bergen, 2013-06-25)
    PROBLEM solving is an important part of all engineering and scientific activities. It is present, for instance, when experts want to develop more fuel-efficient cars or when they are searching for oil and gas in the ...
    Doctoral thesis
  • SMS One-Time Passwords, Security in Two-Factor Authentication 

    Eide, Jan-Erik Lothe (The University of Bergen, 2015-05-29)
    In the past decade, the low price and ease of generating and sending large amounts of SMS have made it possible for many online services to create strong and affordable authentication systems. With the growth of smartphones ...
    Master thesis