Browsing Faculty of Mathematics and Natural Sciences by Document Types "Conference lecture"
Now showing items 1-13 of 13
-
Counting Instances of Software Components
(Proceedings of LRPP'04: Workshop on Logics for Resources, Processes, and Programs, Turku, Finland, July 13, 2004, Conference lecture, 2004-07-13)Component software is software that has been assembled from various pieces of standardized, reusable computer programs, so-called components. Executing component software creates instances of these components. For several ... -
Flame Propagation in Dust Clouds: Challenges for Model Validation
(Conference lecture, 2010)Modelling of industrial dust explosions poses a formidable challenge to researchers and safety engineers. Whereas current best practice with respect to modelling the consequences of vapour cloud explosions in the petroleum ... -
Modelling of the Shear Dilation Based Hydraulic Stimulation in Enhanced Geothermal Systems Considering Fractures in Different Scales
(Conference lecture, 2016-09)A numerical approach for modelling of shear dilation of existing fractures in hydraulic stimulation of geothermal reservoirs at low elevated pressures is presented. The fractured rock in the reservoir is modelled as a ... -
On the recent time history and forcing of the inflow of Atlantic Water to the Arctic Mediterranean
(Extended Abstract for The ACIA International Scientific Symposium on Climate Change in the Arctic, Conference lecture, 2004) -
On the relationship between multiple porosity models and continuous time random walk
(Conference lecture, 2010)We derive a multiple porosity model based on the continuous time random walk model (CTRW). In particular, we show how the parameters of the multiple porosity models relate to the transition probability function which is ... -
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
(Conference lecture, 2012)As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, ... -
Receptor for activated C-kinase (RACK1) plays a central role in Ras-mediated signal transduction
(Conference lecture, 2010-09-24) -
Security Analysis of two Distance-Bounding Protocols
(Conference lecture, 2012)In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestimated. ... -
Simualtion of Three-phase Flow in Porous Media Including Capillary Pressure Representing Variation in Rock Wettability
(Conference lecture, 2011-04-12) -
Simulating the Effect of Release of Pressure and Dust Lifting on Coal Dust Explosions
(Conference lecture, 2007)Dispersion of accumulated layers of combustible dust by turbulent flow or shock waves ahead of a propagating flame can play an important role for explosion propagation in coal mines. In 1924, Greenwald and Wheeler investigated ... -
Simulating the Influence of Obstacles on Accelerating Dust and Gas Flames
(Conference lecture, 2005) -
Turbidites in the Eocene of Spitsbergen: can they tell us something about the Sørvestsnaget Basin?
(Conference lecture, 2017) -
A unified multilevel framework of upscaling and domain decomposition
(Conference lecture, 2010)We consider multiscale preconditioners for a class of mass-conservative domain-decomposition (MCDD) methods. For the application of reservoir simulation, we need to solve large linear systems, arising from finite-volume ...