Now showing items 610-629 of 767

    • Security in cloud computing and virtual environments 

      Aarseth, Raymond (Master thesis, 2015-09-14)
      Cloud computing is a big buzzwords today. Just watch the commercials on TV and I can promise that you will hear the word cloud service at least once. With the growth of cloud technology steadily rising, and everything from ...
    • Security in Docker Swarm: orchestration service for distributed software systems 

      Sæther, Didrik (Master thesis, 2018-10-18)
      With a constantly increasingly number of services in modern software systems (SOA and micro services), managing such service infrastructure becomes a challenge. Docker Swarm is a popular service orchestration solution that ...
    • SeeCiTe: a method to assess CNV calls from SNP arrays using trio data 

      Lavrichenko, Ksenia; Helgeland, Øyvind; Njølstad, Pål Rasmus; Jonassen, Inge; Johansson, Stefan (Journal article; Peer reviewed, 2021)
      Motivation Single nucleotide polymorphism (SNP) genotyping arrays remain an attractive platform for assaying copy number variants (CNVs) in large population-wide cohorts. However, current tools for calling CNVs are still ...
    • The Seismic Analyzer: Interpreting and Illustrating 2D Seismic Data 

      Patel, Daniel; Giertsen, Christopher; Thurmond, John; Gjelberg, John; Gröller, Eduard (Peer reviewed; Journal article, 2008)
      We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify ...
    • Selected Topics in Cryptanalysis of Symmetric Ciphers 

      Indrøy, John Petter (Doctoral thesis, 2021-10-27)
      It is well established that a symmetric cipher may be described as a system of Boolean polynomials, and that the security of the cipher cannot be better than the difficulty of solving said system. Compressed Right-Hand ...
    • Selected x86 Low-level Attacks and Mitigations 

      Otterstad, Christian W. (Doctoral thesis, 2017)
      Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain control over, and control, the flow of execution, as well as multiple methods and approaches to mitigate the same issue. This ...
    • Self-stabilizing algorithms for the distance-k coloring problem 

      Wang, Shuang (Master thesis, 2008-11-10)
      Many problems of practical interest can be modeled as coloring problems. For example, when you are making a phone call using a mobile phone, it needs to transform the voice signal into an electronic wireless signal. Eachsuch ...
    • SelGenes: a tool for selecting marker genes in heterogeneous samples 

      Samdal, Kristian Brakstad (Master thesis, 2016-05-31)
      SelGenes is a tool for selecting marker genes for the dominating cell type in heterogeneous samples. Based on a framework from an existing algorithm, SelGenes selects cell-type specific marker genes for the dominating ...
    • Selvstabiliserende algoritmer for frekvensallokering 

      Solem, Tom Martens Meyer (Master thesis, 2004)
    • Semantic Snapping for Guided Multi-View Visualization Design 

      Kristiansen, Yngve Sekse; Garrison, Laura Ann; Bruckner, Stefan (Journal article; Peer reviewed, 2022)
      Visual information displays are typically composed of multiple visualizations that are used to facilitate an understanding of the underlying data. A common example are dashboards, which are frequently used in domains such ...
    • Semantics of multiway dataflow constraint systems 

      Haveraaen, Magne; Järvi, Jaakko (Journal article; Peer reviewed, 2021)
      Multiway dataflow constraint systems (MDCS) is a programming model where statements are not executed in a predetermined order. Rather, individual methods are selected from specific method sets and then executed to achieve ...
    • Separating Exceptional Concerns 

      Bagge, Anya Helene (IEEE conference proceedings, Chapter; Peer reviewed, 2012)
      Traditional error handling mechanisms, including exceptions, have several weaknesses that interfere with maintainability, flexibility and genericity in software: Error code is tangled with normal code; reporting is tangled ...
    • Sequences and Linear Codes from Highly Nonlinear Functions 

      Li, Chunlei (Doctoral thesis, 2014-06-16)
      Due to optimal nonlinearity and differential uniformity, perfect nonlinear (PN) and almost perfect nonlinear (APN) functions are of great importance in cryptography. It is interesting that they also define optimal objects ...
    • Sex‑Specifc Diferences in Mortality of Patients with a History of Bariatric Surgery: a Nation‑Wide Population‑Based Study 

      Beiglböck, Hannes; Mörth, Eric; Reichardt, Berthold; Stamm, Tanja; Itariu, Bianca; Harreiter, Jürgen; Hufgard-Leitner, Miriam; Fellinger, Paul; Eichelter, Jakob; Prager, Gerhard; Kautzky, Alexander; Kautzky-Willer, Alexandra; Wolf, Peter; Krebs, Michael (Journal article; Peer reviewed, 2022)
      Purpose Bariatric surgery reduces mortality in patients with severe obesity and is predominantly performed in women. Therefore, an analysis of sex-specific differences after bariatric surgery in a population-based dataset ...
    • The SHIP Validator: An Annotation-based Content-Validation Framework for Java Applications 

      Mancini, Federico; Hovland, Dag; Mughal, Khalid A. (Conference object; Peer reviewed, 2010)
      In this paper, we investigate the use of Java annotations for software security purposes. In particular, we implement a framework for content validation where the validation tests are specified by annotations. This approach ...
    • Shoelaces: An interactive tool for ribosome profiling processing and visualization 

      Birkeland, Åsmund; Chyzynska, Katarzyna; Valen, Eivind (Peer reviewed; Journal article, 2018-07-18)
      Background: The emergence of ribosome profiling to map actively translating ribosomes has laid the foundation for a diverse range of studies on translational regulation. The data obtained with different variations of this ...
    • Similarity-based Exploded Views 

      Ruiz, Marc; Viola, Ivan; Boada, Imma; Bruckner, Stefan; Feixas, Miquel; Sbert, Mateu (Lecture Notes in Computer Science; 5166, Chapter; Peer reviewed, 2008)
      Exploded views are often used in illustration to overcome the problem of occlusion when depicting complex structures. In this paper, we propose a volume visualization technique inspired by exploded views that partitions ...
    • A simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB 

      Rayner, Tim F.; Rocca-Serra, Philippe; Spellman, Paul T.; Causton, Helen C.; Farne, Anna; Holloway, Ele; Irizarry, Rafael A.; Liu, Junmin; Maier, Donald S.; Miller, Michael; Petersen, Kjell; Quackenbush, John; Sherlock, Gavin; Stoeckert, Christian J. Jr; White, Joseph; Whetzel, Patricia L.; Wymore, Farrell; Parkinson, Helen; Sarkans, Ugis; Ball, Catherine A.; Brazma, Alvis (Peer reviewed; Journal article, 2006-11-06)
      Background: Sharing of microarray data within the research community has been greatly facilitated by the development of the disclosure and communication standards MIAME and MAGEML by the MGED Society. However, the complexity ...
    • Simplified Computer Interaction Using Mixed Reality 

      Balabanian, Jean-Paul (Master thesis, 2004)
      This thesis describes a system for mixing reality, as captured by a camera, with a virtual 3-dimensional world. A system to recognize and track a square pattern of markers is created in order to obtain the extrinsic ...
    • Simulation and analysis of clustering for proton CT 

      Grimstad, Silje (Master thesis, 2019-06-29)
      A research team in Bergen in collaboration with others is working to develop a proton Computed Tomography (pCT) prototype. It is an image modality that uses proton rather than x-ray to create a CT-image. This can lead to ...