Now showing items 111-120 of 321
So you've got IPv6 address space. Can you defend it?
(The University of Bergen, 2014-05-29)
Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes ...
On Curvature and Separability in Unconstrained Optimisation
(The University of Bergen, 2006-06-16)
Choice of parameter for DP-based FPT algorithms: four case studies
(The University of Bergen, 2015-09-07)
This thesis studies dynamic programming algorithms and structural parameters used when solving computationally hard problems. In particular, we look at algorithms that make use of structural decompositions to overcome ...
Self-stabilizing algorithms for the distance-k coloring problem
(The University of Bergen, 2008-11-10)
Many problems of practical interest can be modeled as coloring problems. For example, when you are making a phone call using a mobile phone, it needs to transform the voice signal into an electronic wireless signal. Eachsuch ...
Vekthierarkiet for nokre kodeklassar
(The University of Bergen, 1995)
A polynomial-time algorithm for LO based on generalized logarithmic barrier functions
(Academic Publications, 2008)
Generating a synthetic diffusion tensor dataset
During the last years, many techniques for de-noising, segmentation and fiber-tracking have been applied to diffusion tensor MR image data (DTI) from human and animal brains. However, evaluating such methods may be difficult ...
K-packing and K-domination on tree graphs
(The University of Bergen, 2004)
(The University of Bergen, 2002)
Hash functions in Cryptography
(The University of Bergen, 2008)
This thesis is concerned with giving both an overview of the application of hash functions in cryptography and a presentation of today's standard cryptographic hash functions. Cryptographic hash functions are a valuable ...