Now showing items 427-446 of 552

    • Salmon louse (Lepeophtheirus salmonis) transcriptomes during post molting maturation and egg production, revealed using EST-sequencing and microarray analysis 

      Eichner, Christiane; Frost, Petter; Dysvik, Bjarte; Jonassen, Inge; Kristiansen, Bjørn; Nilsen, Frank (Peer reviewed; Journal article, 2008-03-10)
      Background Lepeophtheirus salmonis is an ectoparasitic copepod feeding on skin, mucus and blood from salmonid hosts. Initial analysis of EST sequences from pre adult and adult stages of L. salmonis revealed a large proportion ...
    • SBMLmod: a Python-based web application and web service for efficient data integration and model simulation 

      Schäuble, Sascha; Stavrum, Anne-Kristin; Bockwoldt, Mathias; Puntervoll, Pål; Heiland, Ines (Peer reviewed; Journal article, 2017-06-24)
      Background: Systems Biology Markup Language (SBML) is the standard model representation and description language in systems biology. Enriching and analysing systems biology models by integrating the multitude of available ...
    • Scaling the scales - A suggested improvement to IBM's Intelligent Recommendation Algorithm 

      Myrtveit, Magnar (Master thesis, 2014-11-20)
      Recommender systems appear in a large variety of applications, and their use has become very common in recent years. As a lot of money can be made by companies having a better recommender system than their competitors, ...
    • The Second Rewrite Engines Competition 

      Durán, Francisco; Roldán, Manuel; Balland, Emilie; van den Brand, Mark; Eker, Steven; Kalleberg, Karl Trygve; Kats, Lennart C. L.; Moreau, Pierre-Etienne; Schevchenko, Ruslan; Visser, Eelco (Journal article, 2009-06-29)
      The Second Rewrite Engines Competition (REC) was celebrated as part of the 7th Workshop on Rewriting Logic and its Applications (WRLA 2008). In this edition of the competition participated five systems, namely ASF+SDF, ...
    • Security analysis of electronic voting and online banking systems 

      Tjøstheim, Thomas (Doctoral thesis, 2007-08-29)
      The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, ...
    • Security Analysis Of Lightweight Schemes for RFID Systems 

      Abyaneh, Mohammad Reza Sohizadeh (Doctoral thesis, 2012-08-08)
      This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ...
    • Security Analysis of two Distance-Bounding Protocols 

      Abyaneh, Mohammad Reza Sohizadeh (Conference object, 2012)
      In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestimated. ...
    • Security API for Java ME: secureXdata 

      Valvik, Remi André Bognøy (Master thesis, 2012-02-24)
      The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ...
    • Security in cloud computing and virtual environments 

      Aarseth, Raymond (Master thesis, 2015-09-14)
      Cloud computing is a big buzzwords today. Just watch the commercials on TV and I can promise that you will hear the word cloud service at least once. With the growth of cloud technology steadily rising, and everything from ...
    • Security in Docker Swarm: orchestration service for distributed software systems 

      Sæther, Didrik (Master thesis, 2018-10-18)
      With a constantly increasingly number of services in modern software systems (SOA and micro services), managing such service infrastructure becomes a challenge. Docker Swarm is a popular service orchestration solution that ...
    • The Seismic Analyzer: Interpreting and Illustrating 2D Seismic Data 

      Patel, Daniel; Giertsen, Christopher; Thurmond, John; Gjelberg, John; Gröller, Eduard (Peer reviewed; Journal article, 2008)
      We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify ...
    • Self-stabilizing algorithms for the distance-k coloring problem 

      Wang, Shuang (Master thesis, 2008-11-10)
      Many problems of practical interest can be modeled as coloring problems. For example, when you are making a phone call using a mobile phone, it needs to transform the voice signal into an electronic wireless signal. Eachsuch ...
    • SelGenes: a tool for selecting marker genes in heterogeneous samples 

      Samdal, Kristian Brakstad (Master thesis, 2016-05-31)
      SelGenes is a tool for selecting marker genes for the dominating cell type in heterogeneous samples. Based on a framework from an existing algorithm, SelGenes selects cell-type specific marker genes for the dominating ...
    • Selvstabiliserende algoritmer for frekvensallokering 

      Solem, Tom Martens Meyer (Master thesis, 2004)
    • Separating Exceptional Concerns 

      Bagge, Anya Helene (IEEE conference proceedings, Chapter; Peer reviewed, 2012)
      Traditional error handling mechanisms, including exceptions, have several weaknesses that interfere with maintainability, flexibility and genericity in software: Error code is tangled with normal code; reporting is tangled ...
    • Sequences and Linear Codes from Highly Nonlinear Functions 

      Li, Chunlei (Doctoral thesis, 2014-06-16)
      Due to optimal nonlinearity and differential uniformity, perfect nonlinear (PN) and almost perfect nonlinear (APN) functions are of great importance in cryptography. It is interesting that they also define optimal objects ...
    • The SHIP Validator: An Annotation-based Content-Validation Framework for Java Applications 

      Mancini, Federico; Hovland, Dag; Mughal, Khalid A. (Conference object; Peer reviewed, 2010)
      In this paper, we investigate the use of Java annotations for software security purposes. In particular, we implement a framework for content validation where the validation tests are specified by annotations. This approach ...
    • Shoelaces: An interactive tool for ribosome profiling processing and visualization 

      Birkeland, Åsmund; Chyzynska, Katarzyna; Valen, Eivind (Peer reviewed; Journal article, 2018-07-18)
      Background: The emergence of ribosome profiling to map actively translating ribosomes has laid the foundation for a diverse range of studies on translational regulation. The data obtained with different variations of this ...
    • Similarity-based Exploded Views 

      Ruiz, Marc; Viola, Ivan; Boada, Imma; Bruckner, Stefan; Feixas, Miquel; Sbert, Mateu (Lecture Notes in Computer Science; 5166, Chapter; Peer reviewed, 2008)
      Exploded views are often used in illustration to overcome the problem of occlusion when depicting complex structures. In this paper, we propose a volume visualization technique inspired by exploded views that partitions ...
    • A simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB 

      Rayner, Tim F.; Rocca-Serra, Philippe; Spellman, Paul T.; Causton, Helen C.; Farne, Anna; Holloway, Ele; Irizarry, Rafael A.; Liu, Junmin; Maier, Donald S.; Miller, Michael; Petersen, Kjell; Quackenbush, John; Sherlock, Gavin; Stoeckert, Christian J. Jr; White, Joseph; Whetzel, Patricia L.; Wymore, Farrell; Parkinson, Helen; Sarkans, Ugis; Ball, Catherine A.; Brazma, Alvis (Peer reviewed; Journal article, 2006-11-06)
      Background: Sharing of microarray data within the research community has been greatly facilitated by the development of the disclosure and communication standards MIAME and MAGEML by the MGED Society. However, the complexity ...