Now showing items 602-621 of 738

• #### The SHIP Validator: An Annotation-based Content-Validation Framework for Java Applications ﻿

(Conference object; Peer reviewed, 2010)
In this paper, we investigate the use of Java annotations for software security purposes. In particular, we implement a framework for content validation where the validation tests are specified by annotations. This approach ...
• #### Shoelaces: An interactive tool for ribosome profiling processing and visualization ﻿

(Peer reviewed; Journal article, 2018-07-18)
Background: The emergence of ribosome profiling to map actively translating ribosomes has laid the foundation for a diverse range of studies on translational regulation. The data obtained with different variations of this ...
• #### Similarity-based Exploded Views ﻿

(Lecture Notes in Computer Science; 5166, Chapter; Peer reviewed, 2008)
Exploded views are often used in illustration to overcome the problem of occlusion when depicting complex structures. In this paper, we propose a volume visualization technique inspired by exploded views that partitions ...
• #### A simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB ﻿

(Peer reviewed; Journal article, 2006-11-06)
Background: Sharing of microarray data within the research community has been greatly facilitated by the development of the disclosure and communication standards MIAME and MAGEML by the MGED Society. However, the complexity ...
• #### Simplified Computer Interaction Using Mixed Reality ﻿

(Master thesis, 2004)
This thesis describes a system for mixing reality, as captured by a camera, with a virtual 3-dimensional world. A system to recognize and track a square pattern of markers is created in order to obtain the extrinsic ...
• #### Simulation and analysis of clustering for proton CT ﻿

(Master thesis, 2019-06-29)
A research team in Bergen in collaboration with others is working to develop a proton Computed Tomography (pCT) prototype. It is an image modality that uses proton rather than x-ray to create a CT-image. This can lead to ...
• #### Skaping av meirverdi gjennom opne data om kollektivtrafikk ﻿

(Master thesis, 2015-05-04)
Tema i denne oppgåva er opne data, med ei avgrensing mot kollektivtrafikkdata. Djupnestudien er retta mot verksemda til Skyss, det fylkeskommunale kollektivtrafikkselskapet i Hordaland. Omgrepet opne data" inneber at andre ...
• #### Sketch-based Modelling and Conceptual Visualization of Geomorphological Processes for Interactive Scientific Communication ﻿

(Doctoral thesis, 2014-09-19)
Throughout this dissertation, solutions for rapid digitalization of ideas will be defined. More precisely, the focus is on interactive scientific sketching and communication of geology, where the result is a digital ...
• #### Sketch-based Storytelling for Cognitive Problem Solving: Externalization, Evaluation, and Communication in Geology ﻿

(Doctoral thesis; Peer reviewed, 2013-06-25)
PROBLEM solving is an important part of all engineering and scientific activities. It is present, for instance, when experts want to develop more fuel-efficient cars or when they are searching for oil and gas in the ...
• #### Smart Surrogate Widgets for Direct Volume Manipulation ﻿

(Conference object; Peer reviewed; Journal article, 2018)
Interaction is an essential aspect in volume visualization, yet common manipulation tools such as bounding boxes or clipping plane widgets provide rather crude tools as they neglect the complex structure of the underlying ...
• #### SMS One-Time Passwords, Security in Two-Factor Authentication ﻿

(Master thesis, 2015-05-29)
In the past decade, the low price and ease of generating and sending large amounts of SMS have made it possible for many online services to create strong and affordable authentication systems. With the growth of smartphones ...
• #### So you've got IPv6 address space. Can you defend it? ﻿

(Master thesis, 2014-05-29)
Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes ...
• #### Software modeling of the propagation of electromagnetic beams through different media ﻿

(Master thesis, 2014-06-02)
Propagation and focusing of electromagnetic beams through layered anisotropic medium is of interest in the field of optical data storage, where thin layers are mounted on glass substrates, display technology, where polarised ...
• #### Solving Compressed Right Hand Side Equation Systems with Linear Absorption ﻿

(Chapter; Peer reviewed, 2012)
In this paper we describe an approach for solving complex multivariate equation systems related to algebraic cryptanalysis. The work uses the newly introduced Compressed Right Hand Sides (CRHS) representation, where equations ...
• #### Solving Equation Systems by Agreeing and Learning ﻿

(Chapter; Peer reviewed, 2010)
We study sparse non-linear equation systems defined over a finite field. Representing the equations as symbols and using the Agreeing algorithm we show how to learn and store new knowledge about the system when a ...
• #### Solving LPN Using Covering Codes ﻿

(Peer reviewed; Journal article, 2019-10-15)
We present a new algorithm for solving the LPN problem. The algorithm has a similar form as some previous methods, but includes a new key step that makes use of approximations of random words to a nearest codeword in a ...
• #### Solving System of Nonlinear Equations Using Methods in the Halley Class ﻿

(Master thesis, 2009-05-26)
In this thesis a new iterative frame work to solve the nonlinear system of equations $F(x)=0$ in n-dimensional real space is established. This iterative frame work is based on a quadratic model of the function $F(x)$ ...
• #### Solving the 2-disjoint connected subgraphs problem faster than 2ⁿ ﻿

(Peer reviewed; Journal article, 2014-10)
The 2-DISJOINT CONNECTED SUBGRAPHS problem, given a graph along with two disjoint sets of terminals Z1,Z2, asks whether it is possible to find disjoint sets A1,A2, such that Z1 ⊆ A1, Z2 ⊆ A2 and A1,A2 induce connected ...
• #### Solving the pooling problem with LMI relaxations ﻿

(Chapter; Peer reviewed, 2012)
We consider the standard pooling problem with a single quality parameter, which is a polynomial global optimization problem occurring among other places in the oil industry. In this paper, we show that if the feasible set ...
• #### Some group-theoretical results on Feistel Networks in a long-key scenario ﻿

(Journal article; Peer reviewed, 2020)
The study of the trapdoors that can be hidden in a block cipher is and has always been a high-interest topic in symmetric cryptography. In this paper we focus on Feistel-network-like ciphers in a classical long-key scenario ...