Now showing items 493-512 of 643

    • Regulatory mechanisms of non-coding RNAs during zebrafish embryogenesis 

      Nepal, Chirag (Doctoral thesis; Peer reviewed, 2013-05-03)
      For many years, RNAs were thought to be intermediate products between DNA and protein. The discovery of RNA interference (RNAi), a regulatory process that uses small non-coding RNAs to regulate gene expression at the ...
    • Relative Persistent Homology 

      Blaser, Nello; Brun, Morten (Journal article; Peer reviewed, 2020)
      The alpha complex efficiently computes persistent homology of a point cloud X in Euclidean space when the dimension d is low. Given a subset A of X, relative persistent homology can be computed as the persistent homology ...
    • Reliable Asynchronous Communication in Distributed Systems 

      Johnsen, Espen (Master thesis, 2018-04-11)
    • Repeats and EST analysis for new organisms 

      Malde, Ketil; Jonassen, Inge (Journal article, 2008-01-18)
      Background Repeat masking is an important step in the EST analysis pipeline. For new species, genomic knowledge is scarce and good repeat libraries are typically unavailable. In these cases it is common practice to mask ...
    • Ridge Extraction, and Illustrative Visualization of an FTLE Flow Field. 

      Sivertsen, Stian (Master thesis, 2012-06-01)
      Illustrative visualization of a flow is an area that is proving to be interesting and in later years something that have been somewhat explored, it can provide some very interesting results and in this thesis we find the ...
    • Risks in Networked Computer Systems 

      Klingsheim, André N. (Doctoral thesis, 2008-09-24)
      Networked computer systems yield great value to businesses and governments, but also create risks. The eight papers in this thesis highlight vulnerabilities in computer systems that lead to security and privacy risks. A ...
    • Robust Cross-Platform Workflows: How Technical and Scientific Communities Collaborate to Develop, Test and Share Best Practices for Data Analysis 

      Möller, Steffen; Prescott, Stuart W.; Wirzenius, Lars; Reinholdtsen, Petter; Chapman, Brad; Prins, Pjotr; Soiland-Reyes, Stian; Klötzl, Fabian; Bagnacani, Andrea; Kalaš, Matúš; Tille, Andreas; Crusoe, Michael R. (Peer reviewed; Journal article, 2017-09)
      Information integration and workflow technologies for data analysis have always been major fields of investigation in bioinformatics. A range of popular workflow suites are available to support analyses in computational ...
    • Robust Independent Validation of Experiment and Theory: Rivet version 3 

      Bierlich, Christian; Buckley, Andy; Butterworth, J. M.; Corpe, L.; Grellscheid, David; Gütschow, C.; Karczmarczyk, P.; Klein, J.; Lönnblad, Leif; Pollard, C. S.; Schulz, Holger; Siegert, Frank (Journal article; Peer reviewed, 2020)
      First released in 2010, the Rivet library forms an important repository for analysis code, facilitating comparisons between measurements of the final state in particle collisions and theoretical calculations of those final ...
    • The Role of Humans in Complex ICT Systems 

      Kazymyrova, Valentyna (Master thesis, 2016-10-16)
      In the modern world, companies, regardless of their type of business, rely on information and communications technology (ICT) systems to carry out their everyday operations. The ICT systems have been developed over time ...
    • Rotasjonsinvariante turbokoder 

      Knudtsen, Christian Skauge (Master thesis, 2003)
    • Salmon louse (Lepeophtheirus salmonis) transcriptomes during post molting maturation and egg production, revealed using EST-sequencing and microarray analysis 

      Eichner, Christiane; Frost, Petter; Dysvik, Bjarte; Jonassen, Inge; Kristiansen, Bjørn; Nilsen, Frank (Peer reviewed; Journal article, 2008-03-10)
      Background Lepeophtheirus salmonis is an ectoparasitic copepod feeding on skin, mucus and blood from salmonid hosts. Initial analysis of EST sequences from pre adult and adult stages of L. salmonis revealed a large proportion ...
    • SBMLmod: a Python-based web application and web service for efficient data integration and model simulation 

      Schäuble, Sascha; Stavrum, Anne-Kristin; Bockwoldt, Mathias; Puntervoll, Pål; Heiland, Ines (Peer reviewed; Journal article, 2017-06-24)
      Background: Systems Biology Markup Language (SBML) is the standard model representation and description language in systems biology. Enriching and analysing systems biology models by integrating the multitude of available ...
    • Scaling the scales - A suggested improvement to IBM's Intelligent Recommendation Algorithm 

      Myrtveit, Magnar (Master thesis, 2014-11-20)
      Recommender systems appear in a large variety of applications, and their use has become very common in recent years. As a lot of money can be made by companies having a better recommender system than their competitors, ...
    • The Second Rewrite Engines Competition 

      Durán, Francisco; Roldán, Manuel; Balland, Emilie; van den Brand, Mark; Eker, Steven; Kalleberg, Karl Trygve; Kats, Lennart C. L.; Moreau, Pierre-Etienne; Schevchenko, Ruslan; Visser, Eelco (Journal article, 2009-06-29)
      The Second Rewrite Engines Competition (REC) was celebrated as part of the 7th Workshop on Rewriting Logic and its Applications (WRLA 2008). In this edition of the competition participated five systems, namely ASF+SDF, ...
    • Security analysis of electronic voting and online banking systems 

      Tjøstheim, Thomas (Doctoral thesis, 2007-08-29)
      The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, ...
    • Security Analysis Of Lightweight Schemes for RFID Systems 

      Abyaneh, Mohammad Reza Sohizadeh (Doctoral thesis, 2012-08-08)
      This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ...
    • Security Analysis of two Distance-Bounding Protocols 

      Abyaneh, Mohammad Reza Sohizadeh (Conference object, 2012)
      In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestimated. ...
    • Security API for Java ME: secureXdata 

      Valvik, Remi André Bognøy (Master thesis, 2012-02-24)
      The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ...
    • Security in cloud computing and virtual environments 

      Aarseth, Raymond (Master thesis, 2015-09-14)
      Cloud computing is a big buzzwords today. Just watch the commercials on TV and I can promise that you will hear the word cloud service at least once. With the growth of cloud technology steadily rising, and everything from ...
    • Security in Docker Swarm: orchestration service for distributed software systems 

      Sæther, Didrik (Master thesis, 2018-10-18)
      With a constantly increasingly number of services in modern software systems (SOA and micro services), managing such service infrastructure becomes a challenge. Docker Swarm is a popular service orchestration solution that ...