• Considering Best Practices in Color Palettes for Molecular Visualizations 

      Garrison, Laura Ann; Bruckner, Stefan (Journal article; Peer reviewed, 2022)
      Biomedical illustration and visualization techniques provide a window into complex molecular worlds that are difficult to capture through experimental means alone. Biomedical illustrators frequently employ color to help ...
    • Consistency of Heterogeneously Typed Behavioural Models: A Coalgebraic Approach 

      Wolter, Uwe Egbert; König, Harald (Journal article; Peer reviewed, 2022)
      Systematic and formally underpinned consistency checking of heterogeneously typed interdependent behavioural models requires a common metamodel, into which the involved models can be translated. And, if additional system ...
    • Consistency of LSO with syntactic equality 

      Spörl, Yannick (Master thesis, 2023-06-01)
      LSO, Logic of Sentential Operators, is defined by extending first- order logic by sentential quantification and sentential operators. Its semantics is defined by a digraph, with kernels reflecting consistent valuations of ...
    • Constructing APN functions through isotopic shifts 

      Budaghyan, Lilya; Calderini, Marco; Carlet, Claude; Coulter, Robert; Villa, Irene (Journal article; Peer reviewed, 2020)
      Almost perfect nonlinear (APN) functions over fields of characteristic 2 play an important role in cryptography, coding theory and, more generally, mathematics and information theory. In this paper we deduce a new method ...
    • Construction of the circle in UniMath 

      Bezem, Marc; Buchholtz, Ulrik; Grayson, Daniel R.; Shulman, Michael (Journal article; Peer reviewed, 2021)
      We show that the type TZ of Z-torsors has the dependent universal property of the circle, which characterizes it up to a unique homotopy equivalence. The construction uses Voevodsky’s Univalence Axiom and propositional ...
    • Continuous Levels-of-Detail and Visual Abstraction for Seamless Molecular Visualization 

      Parulek, Julius; Jönsson, Daniel; Ropinski, Timo; Bruckner, Stefan; Ynnerman, Anders; Viola, Ivan (Peer reviewed; Journal article, 2014-05-06)
      Molecular visualization is often challenged with rendering of large molecular structures in real time. We introduce a novel approach that enables us to show even large protein complexes. Our method is based on the ...
    • Convergence of Feedback Arc Set-Based Heuristics for Linear Structural Equation Models 

      Gillot, Pierre; Parviainen, Pekka (Journal article; Peer reviewed, 2022)
      Score-based structure learning in Bayesian networks, where local structures in the graph are given a score and one seeks to recover a high-scoring DAG from data, is an NP-hard problem. While the general learning problem ...
    • Convexity, convolution and competitive equilibrium 

      Flåm, Sjur Didrik (Journal article; Peer reviewed, 2023)
      This paper considers a chief interface between mathematical programming and economics, namely: money-based trade of perfectly divisible and transferable goods. Three important and related features are singled out here: ...
    • Cost-sensitive ensemble learning: a unifying framework 

      Petrides, George; Verbeke, Wouter (Journal article; Peer reviewed, 2022)
      Over the years, a plethora of cost-sensitive methods have been proposed for learning on data when different types of misclassification errors incur different costs. Our contribution is a unifying framework that provides a ...
    • Counting Instances of Software Components 

      Bezem, Marcus A.; Truong, Anh Hoang (Proceedings of LRPP'04: Workshop on Logics for Resources, Processes, and Programs, Turku, Finland, July 13, 2004, Conference lecture, 2004-07-13)
      Component software is software that has been assembled from various pieces of standardized, reusable computer programs, so-called components. Executing component software creates instances of these components. For several ...
    • Counting research ⇒ directing research : the hazard of using simple metrics to evaluate scientific contributions : an EU experience 

      Olsen, Kai A.; Malizia, Alessio (Journal article; Peer reviewed, 2017)
      In many EU countries there is a requirement to count research, i.e., to measure and prove its value. These numbers, often produced automatically based on the impact of journals, are used to rank universities, to determine ...
    • Covering Vectors by Spaces in Perturbed Graphic Matroids and Their Duals 

      Fomin, Fedor; Golovach, Petr; Lokshtanov, Daniel; Saurabh, Saket; Zehavi, Meirav (Peer reviewed; Journal article, 2019)
      Perturbed graphic matroids are binary matroids that can be obtained from a graphic matroid by adding a noise of small rank. More precisely, an r-rank perturbed graphic matroid M is a binary matroid that can be represented ...
    • Creating a Virtual Reality Orchestral Concert Experience With 3D Audio 

      Røsvik, Per Magne (Master thesis, 2020-06-16)
      With the emergence of Virtual Reality (VR) and recent advancements on both the hardware and software side, VR is now available to the masses and a plethora of new experiences can be made and explored by people and researchers. ...
    • Creating Capture-the-Flag Challenges Inspired by Common Crypto Mistakes 

      Lone, Simen Karlsen (Master thesis, 2020-06-25)
    • CRISPR Genome Editing Made Easy Through the CHOPCHOP Website 

      Labun, Kornel; Krause, Maximilian; Torres Cleuren, Yamila Nicole; Valen, Eivind Dale (Journal article; Peer reviewed, 2021)
      The design of optimal guide RNA (gRNA) sequences for CRISPR systems is challenged by the need to achieve highly efficient editing at the desired location (on-target editing) with minimal editing at unintended locations ...
    • A critical view on Public Key Infrastructures 

      Tjøstheim, Thomas (Master thesis, 2004)
    • Cross-Site Scripting Protection in Firefox. Creating a filter for Firefox protecting against Reflected cross-site scripting attacks 

      Vikne, Andreas Svardal (Master thesis, 2018-08-21)
      One of the most dominant threats against web applications is the class of script injection attacks, also called cross-site scripting. This class of attacks affects the client-side of a web application, and is a critical ...
    • Cryptanalysis of AES 

      Rye, Kristoffer Zakariassen (Master thesis, 2020-07-04)
      This thesis consists of an introductory part of how the symmetric cipher AES works in detail and how truncated differential cryptanalysis can be used to break some round reduced versions of AES. All the main attacks in ...
    • Cryptanalysis of Cryptographic Primitives and Related Topics 

      Hassanzadeh, Seyed Mehdi Mohammad (Doctoral thesis, 2011-09-09)
      This thesis has focused on the cryptanalysis of cryptographic primitives especially stream ciphers which is an important topic in cryptography. Additionally, the security of network coding is discussed and improved with a ...
    • Cryptographically strong permutations from the butterfly structure 

      Li, Kangquan; Li, Chunlei; Helleseth, Tor; Qu, Longjiang (Journal article; Peer reviewed, 2021)
      Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a cryptographic function is desired to have boomerang uniformity as low as ...