Now showing items 1-10 of 322
Interactive Visual Analysis of Process Data
(The University of Bergen, 2011-11-30)
Data gathered from processes, or process data, contains many different aspects that a visualization system should also convey. Aspects such as, temporal coherence, spatial connectivity, streaming data, and the need for ...
Tournaments and Optimality: New Results in Parameterized Complexity
(The University of Bergen, 2013-11-22)
Støtte for rike klienter i Dynamic Presentation Generator
(The University of Bergen, 2010-06-01)
Denne oppgaven beskriver hvordan det kan legges til støtte for rike klienter i Dynamic Presentation Generator (DPG). Oppgaven tar for seg både server og klientsiden av temaet. DPG er et innholdshåndteringssystem utviklet ...
Aligning a Splice Graph to a Genomic Sequence
(The University of Bergen, 2005-06-01)
On Connections Between Graphs, Codes, Quantum States, and Boolean Functions
(The University of Bergen, 2008-05-28)
We study objects that can be represented as graphs, error-correcting codes, quantum states, or Boolean functions. It is known that self-dual additive codes, which can also be interpreted as quantum states, can be ...
TMM@: a web application for the analysis of transmembrane helix mobility
(BioMed Central, 2007-07-02)
Background: To understand the mechanism by which a protein transmits a signal through the cell membrane, an understanding of the flexibility of its transmembrane (TM) region is essential. Normal Mode Analysis (NMA) has ...
Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids
(The author, 2012)
Recently, a new privacy-preserving elliptic curve based grouping proof protocol with colluding tag prevention( CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which ...
Optimization issues in medical imaging and fiber-tracking
(The University of Bergen, 2008-02-27)
Fiber tracking is a relatively recent methodology, made possible by access to new highly advanced MR scanners able to produce high-quality diffusion tensor images (DTI), which promises clinicians a possibility to observe ...
Security Analysis Of Lightweight Schemes for RFID Systems
(The University of Bergen, 2012-08-08)
This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ...
Security Analysis of two Distance-Bounding Protocols
(The author, 2012)
In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestima ...