Browsing Department of Informatics by Title
Now showing items 590-609 of 751
-
Salmon louse (Lepeophtheirus salmonis) transcriptomes during post molting maturation and egg production, revealed using EST-sequencing and microarray analysis
(Peer reviewed; Journal article, 2008-03-10)Background Lepeophtheirus salmonis is an ectoparasitic copepod feeding on skin, mucus and blood from salmonid hosts. Initial analysis of EST sequences from pre adult and adult stages of L. salmonis revealed a large proportion ... -
The salmon louse genome may be much larger than sequencing suggests
(Journal article; Peer reviewed, 2022)The genome size of organisms impacts their evolution and biology and is often assumed to be characteristic of a species. Here we present the first published estimates of genome size of the ecologically and economically ... -
SBMLmod: a Python-based web application and web service for efficient data integration and model simulation
(Peer reviewed; Journal article, 2017-06-24)Background: Systems Biology Markup Language (SBML) is the standard model representation and description language in systems biology. Enriching and analysing systems biology models by integrating the multitude of available ... -
Scaling the scales - A suggested improvement to IBM's Intelligent Recommendation Algorithm
(Master thesis, 2014-11-20)Recommender systems appear in a large variety of applications, and their use has become very common in recent years. As a lot of money can be made by companies having a better recommender system than their competitors, ... -
The Second Rewrite Engines Competition
(Journal article, 2009-06-29)The Second Rewrite Engines Competition (REC) was celebrated as part of the 7th Workshop on Rewriting Logic and its Applications (WRLA 2008). In this edition of the competition participated five systems, namely ASF+SDF, ... -
Security analysis of electronic voting and online banking systems
(Doctoral thesis, 2007-08-29)The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, ... -
Security Analysis Of Lightweight Schemes for RFID Systems
(Doctoral thesis, 2012-08-08)This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ... -
Security Analysis of two Distance-Bounding Protocols
(Conference object, 2012)In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestimated. ... -
Security API for Java ME: secureXdata
(Master thesis, 2012-02-24)The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ... -
Security in cloud computing and virtual environments
(Master thesis, 2015-09-14)Cloud computing is a big buzzwords today. Just watch the commercials on TV and I can promise that you will hear the word cloud service at least once. With the growth of cloud technology steadily rising, and everything from ... -
Security in Docker Swarm: orchestration service for distributed software systems
(Master thesis, 2018-10-18)With a constantly increasingly number of services in modern software systems (SOA and micro services), managing such service infrastructure becomes a challenge. Docker Swarm is a popular service orchestration solution that ... -
SeeCiTe: a method to assess CNV calls from SNP arrays using trio data
(Journal article; Peer reviewed, 2021)Motivation Single nucleotide polymorphism (SNP) genotyping arrays remain an attractive platform for assaying copy number variants (CNVs) in large population-wide cohorts. However, current tools for calling CNVs are still ... -
The Seismic Analyzer: Interpreting and Illustrating 2D Seismic Data
(Peer reviewed; Journal article, 2008)We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify ... -
Selected Topics in Cryptanalysis of Symmetric Ciphers
(Doctoral thesis, 2021-10-27)It is well established that a symmetric cipher may be described as a system of Boolean polynomials, and that the security of the cipher cannot be better than the difficulty of solving said system. Compressed Right-Hand ... -
Selected x86 Low-level Attacks and Mitigations
(Doctoral thesis, 2017)Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain control over, and control, the flow of execution, as well as multiple methods and approaches to mitigate the same issue. This ... -
Self-stabilizing algorithms for the distance-k coloring problem
(Master thesis, 2008-11-10)Many problems of practical interest can be modeled as coloring problems. For example, when you are making a phone call using a mobile phone, it needs to transform the voice signal into an electronic wireless signal. Eachsuch ... -
SelGenes: a tool for selecting marker genes in heterogeneous samples
(Master thesis, 2016-05-31)SelGenes is a tool for selecting marker genes for the dominating cell type in heterogeneous samples. Based on a framework from an existing algorithm, SelGenes selects cell-type specific marker genes for the dominating ... -
Selvstabiliserende algoritmer for frekvensallokering
(Master thesis, 2004) -
Semantic Snapping for Guided Multi-View Visualization Design
(Journal article; Peer reviewed, 2022)Visual information displays are typically composed of multiple visualizations that are used to facilitate an understanding of the underlying data. A common example are dashboards, which are frequently used in domains such ... -
Semantics of multiway dataflow constraint systems
(Journal article; Peer reviewed, 2021)Multiway dataflow constraint systems (MDCS) is a programming model where statements are not executed in a predetermined order. Rather, individual methods are selected from specific method sets and then executed to achieve ...