• Smart Surrogate Widgets for Direct Volume Manipulation 

      Stoppel, Sergej; Bruckner, Stefan (Peer reviewed; Journal article, 2018)
      Interaction is an essential aspect in volume visualization, yet common manipulation tools such as bounding boxes or clipping plane widgets provide rather crude tools as they neglect the complex structure of the underlying ...
    • sMolBoxes: Dataflow Model for Molecular Dynamics Exploration 

      Ulbrich, Pavol; Waldner, Manuela; Furmanová, Katarína; Marques, Sergio M.; Bednář, David; Kozlíková, Barbora; Byska, Jan (Journal article; Peer reviewed, 2023)
      We present sMolBoxes, a dataflow representation for the exploration and analysis of long molecular dynamics (MD) simulations. When MD simulations reach millions of snapshots, a frame-by-frame observation is not feasible ...
    • SMS One-Time Passwords, Security in Two-Factor Authentication 

      Eide, Jan-Erik Lothe (Master thesis, 2015-05-29)
      In the past decade, the low price and ease of generating and sending large amounts of SMS have made it possible for many online services to create strong and affordable authentication systems. With the growth of smartphones ...
    • So you've got IPv6 address space. Can you defend it? 

      Sande, Mikal (Master thesis, 2014-05-29)
      Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes ...
    • Software modeling of the propagation of electromagnetic beams through different media 

      Bruket, Kjetil Rørvik (Master thesis, 2014-06-02)
      Propagation and focusing of electromagnetic beams through layered anisotropic medium is of interest in the field of optical data storage, where thin layers are mounted on glass substrates, display technology, where polarised ...
    • Solving a pickup and delivery routing problem for fourth-party logistics providers 

      Johannessen, Preben Bucher; Hemmati, Ahmad; Moshref-Javadi, Mohammad (Journal article; Peer reviewed, 2022)
      This paper studies a pickup and delivery routing problem for fourth-party logistics providers. The problem aims to schedule routes of vehicles to pick up orders from suppliers and deliver them to factory locations considering ...
    • Solving Compressed Right Hand Side Equation Systems with Linear Absorption 

      Schilling, Thorsten Ernst; Raddum, Håvard (Lecture Notes in Computer Science; 7280, Chapter; Peer reviewed, 2012)
      In this paper we describe an approach for solving complex multivariate equation systems related to algebraic cryptanalysis. The work uses the newly introduced Compressed Right Hand Sides (CRHS) representation, where equations ...
    • Solving Equation Systems by Agreeing and Learning 

      Schilling, Thorsten Ernst; Raddum, Håvard (Chapter; Peer reviewed, 2010)
      We study sparse non-linear equation systems defined over a finite field. Representing the equations as symbols and using the Agreeing algorithm we show how to learn and store new knowledge about the system when a ...
    • Solving LPN Using Covering Codes 

      Guo, Qian; Johansson, Thomas; Löndahl, Carl (Peer reviewed; Journal article, 2019-10-15)
      We present a new algorithm for solving the LPN problem. The algorithm has a similar form as some previous methods, but includes a new key step that makes use of approximations of random words to a nearest codeword in a ...
    • Solving System of Nonlinear Equations Using Methods in the Halley Class 

      Suleiman, Sara Tagelsir Mohamed (Master thesis, 2009-05-26)
      In this thesis a new iterative frame work to solve the nonlinear system of equations \(F(x)=0\) in n-dimensional real space is established. This iterative frame work is based on a quadratic model of the function \(F(x)\) ...
    • Solving the 2-disjoint connected subgraphs problem faster than 2ⁿ 

      Cygan, Marek; Pilipczuk, Marcin; Pilipczuk, Michal Pawel; Wojtaszczyk, Jakub Onufry (Peer reviewed; Journal article, 2014-10)
      The 2-DISJOINT CONNECTED SUBGRAPHS problem, given a graph along with two disjoint sets of terminals Z1,Z2, asks whether it is possible to find disjoint sets A1,A2, such that Z1 ⊆ A1, Z2 ⊆ A2 and A1,A2 induce connected ...
    • Solving the pooling problem with LMI relaxations 

      Frimannslund, Lennart; El Ghami, Mohamed; Alfaki, Mohammed; Haugland, Dag (Chapter; Peer reviewed, 2012)
      We consider the standard pooling problem with a single quality parameter, which is a polynomial global optimization problem occurring among other places in the oil industry. In this paper, we show that if the feasible set ...
    • Some group-theoretical results on Feistel Networks in a long-key scenario 

      Aragona, Riccardo; Calderini, Marco; Civino, Roberto (Journal article; Peer reviewed, 2020)
      The study of the trapdoors that can be hidden in a block cipher is and has always been a high-interest topic in symmetric cryptography. In this paper we focus on Feistel-network-like ciphers in a classical long-key scenario ...
    • Some properties of K-convex mappings in variable ordering settings 

      Rückmann, Jan-Joachim; Hernandez Escobar, Daniel; Bouza Allende, Gemayqzel (Journal article; Peer reviewed, 2022)
      We consider a generalization of standard vector optimization which is called vector optimization with variable ordering structures. The problem class under consideration is characterized by a point-dependent proper cone-valued ...
    • Sparse Boolean equations and circuit lattices 

      Semaev, Igor (Peer reviewed; Journal article, 2010)
      A system of Boolean equations is called sparse if each equation depends on a small number of variables. Finding efficiently solutions to the system is an underlying hard problem in the cryptanalysis of modern ciphers. In ...
    • Sparse Nerves in Practice 

      Blaser, Nello; Brun, Morten (Peer reviewed; Journal article, 2019)
      Topological data analysis combines machine learning with methods from algebraic topology. Persistent homology, a method to characterize topological features occurring in data at multiple scales is of particular interest. ...
    • Speaker recognition implemented as part of a video-editing system 

      Tveita, Sebastian Rojas (Master thesis, 2019-06-29)
      With machine learning rising to prominence over the last decades, a lot of companies are doing research on how it can be applied in their products or production. Some of these companies have used machine learning with a ...
    • Specificity of Loxosceles α clade phospholipase D enzymes for choline-containing lipids: Role of a conserved aromatic cage 

      Moutoussamy, Emmanuel Edouard; Waheed, Qaiser; Binford, Greta J.; Khan, Hanif Muhammad; Moran, Shane M.; Eitel, Anna R.; Cordes, Matthew H.J.; Reuter, Nathalie (Journal article; Peer reviewed, 2022)
      Spider venom GDPD-like phospholipases D (SicTox) have been identified to be one of the major toxins in recluse spider venom. They are divided into two major clades: the α clade and the β clade. Most α clade toxins present ...
    • Specifying with syntactic theory functors 

      Haveraaen, Magne; Roggenbach, Marcus (Journal article; Peer reviewed, 2020)
      We propose a framework, syntactic theory functors (STFs), for creating syntactic structuring mechanisms for specification languages. Good support for common reuse patterns is important for systematically developing ...
    • Speech-to-text models to transcribe emergency calls 

      Thuestad, Jens Andreas; Grutle, Øyvind (Master thesis, 2023-06-01)
      This thesis is part of the larger project “AI-Support in Medical Emergency Calls (AISMEC)”, which aims to develop a decision support system for Emergency Medical Communication Center (EMCC) operators to better identify and ...