Department of Informatics
Nye registreringer
-
Mind Your Outcomes: The ∆QSD Paradigm for Quality-Centric Systems Development and Its Application to a Blockchain Case Study
(Journal article; Peer reviewed, 2022)This paper directly addresses a long-standing issue that affects the development of many complex distributed software systems: how to establish quickly, cheaply, and reliably whether they can deliver their intended performance ... -
Hormonal regulation of ovarian follicle growth in humans: Model-based exploration of cycle variability and parameter sensitivities
(Journal article; Peer reviewed, 2022)We present a modelling and simulation framework for the dynamics of ovarian follicles and key hormones along the hypothalamic-pituitary–gonadal axis throughout consecutive human menstrual cycles. All simulation results ... -
A number theoretic view on binary shift registers
(Journal article; Peer reviewed, 2022)We describe a number theoretic view on binary shift registers. We illustrate this approach on some basic shift registers by revisiting known and obtaining new results, which we prove using tools from basic number theory, ... -
Deep Learning Methods for Automated Classification of Fish Behavior
(Master thesis, 2022-06-01) -
Algorithms for rainbow vertex colouring diametral path graphs
(Master thesis, 2022-06-01) -
A Snakemake workflow for analysing alternative splicing events from short-read RNA-seq data
(Master thesis, 2022-04-13) -
Specificity of Loxosceles α clade phospholipase D enzymes for choline-containing lipids: Role of a conserved aromatic cage
(Journal article; Peer reviewed, 2022)Spider venom GDPD-like phospholipases D (SicTox) have been identified to be one of the major toxins in recluse spider venom. They are divided into two major clades: the α clade and the β clade. Most α clade toxins present ... -
Small Open Reading Frames, How to Find Them and Determine Their Function
(Journal article; Peer reviewed, 2022)Advances in genomics and molecular biology have revealed an abundance of small open reading frames (sORFs) across all types of transcripts. While these sORFs are often assumed to be non-functional, many have been implicated ... -
Selected x86 Low-level Attacks and Mitigations
(Doctoral thesis, 2017)Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain control over, and control, the flow of execution, as well as multiple methods and approaches to mitigate the same issue. This ... -
Decoding and constructions of codes in rank and Hamming metric
(Doctoral thesis, 2022-05-27)As coding theory plays an important role in data transmission, decoding algorithms for new families of error correction codes are of great interest. This dissertation is dedicated to the decoding algorithms for new families ... -
Order-Related Problems Parameterized by Width
(Doctoral thesis, 2022-05-25)In the main body of this thesis, we study two different order theoretic problems. The first problem, called Completion of an Ordering, asks to extend a given finite partial order to a complete linear order while respecting ... -
Towards a Spreadsheet-Based Language Workbench
(Chapter, 2021)Spreadsheets are widely used across industries for various purposes, including for storing and manipulating data in a structured form. Such structured forms—expressed using tabular notation—have found their way in language ... -
The salmon louse genome may be much larger than sequencing suggests
(Journal article; Peer reviewed, 2022)The genome size of organisms impacts their evolution and biology and is often assumed to be characteristic of a species. Here we present the first published estimates of genome size of the ecologically and economically ... -
Unitary Branching Programs: Learnability and Lower Bounds
(Journal article; Peer reviewed, 2021)Bounded width branching programs are a formalism that can be used to capture the notion of non-uniform constant-space computation. In this work, we study a generalized version of bounded width branching programs where ... -
On Supergraphs Satisfying CMSO Properties
(Journal article; Peer reviewed, 2021)Let CMSO denote the counting monadic second order logic of graphs. We give a constructive proof that for some computable function f, there is an algorithm A that takes as input a CMSO sentence φ, a positive integer t, and ... -
On the IND-CCA1 Security of FHE Schemes
(Journal article; Peer reviewed, 2022)Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first. There are numerous FHE schemes, all of which ... -
Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions
(Journal article; Peer reviewed, 2021)We revisit and take a closer look at a (not so well known) result of a 2017 paper, showing that the differential uniformity of any vectorial function is bounded from below by an expression depending on the size of its image ... -
On Neural Associative Memory Structures: Storage and Retrieval of Sequences in a Chain of Tournaments
(Journal article; Peer reviewed, 2021)Associative memories enjoy many interesting properties in terms of error correction capabilities, robustness to noise, storage capacity, and retrieval performance, and their usage spans over a large set of applications. ... -
Parameterized Complexity of Directed Spanner Problems
(Journal article; Peer reviewed, 2021)We initiate the parameterized complexity study of minimum t-spanner problems on directed graphs. For a positive integer t, a multiplicative t-spanner of a (directed) graph G is a spanning subgraph H such that the distance ... -
DimLift: Interactive Hierarchical Data Exploration through Dimensional Bundling
(Journal article; Peer reviewed, 2021)The identification of interesting patterns and relationships is essential to exploratory data analysis. This becomes increasingly difficult in high dimensional datasets. While dimensionality reduction techniques can be ...