Now showing items 76-95 of 268

  • Feasible Algorithms for Semantics — Employing Automata and Inference Systems 

    Hovland, Dag (The University of Bergen, 2010-12-16)
  • Filtering duplicate reads from 454 pyrosequencing data 

    Balzer, Susanne Mignon; Malde, Ketil; Grohme, Markus A.; Jonassen, Inge (Oxford University Press, 2013)
    Motivation: Throughout the recent years, 454 pyrosequencing has emerged as an efficient alternative to traditional Sanger sequencing and is widely used in both de novo whole-genome sequencing and metagenomics. Especially ...
  • Filtering of FTLE for Visualizing Spatial Separation in Unsteady 3D Flow 

    Pobitzer, Armin; Peikert, Ronald; Fuchs, Raphael; Theisel, Holger; Hauser, Helwig (Springer, 2012)
    In many cases, feature detection for flow visualization is structured in two phases: first candidate identification, and then filtering. With this paper, we propose to use the directional information contained in the ...
  • Finding k Disjoint Triangles in an Arbitrary Graph 

    Fellows, Mike; Heggernes, Pinar; Rosamond, Frances; Sloper, Christian; Telle, Jan Arne (Springer Verlag, 2004)
  • Finding Resource Bounds in the Presence of Explicit Deallocation 

    Truong, Anh Hoang; Bezem, Marcus A. (Springer Berlin Heidelberg, 2005-10-17)
    A software program requesting a resource that is not available usually raises an out-of-resource exception. Component software is software that has been assembled from standardized, reusable components which, in turn, may ...
  • Fixed Parameter Set Splitting, Linear Kernel and Improved Running Time 

    Lokshtanov, Daniel; Sloper, Christian (2005)
  • Floating Fault Analysis of Trivium 

    Hojsík, Michal; Rudolf, Bohuslav (Springer Berlin Heidelberg, 2008)
    One of the eSTREAM final portfolio ciphers is the hardwareoriented stream cipher Trivium. It is based on 3 nonlinear feedback shift registers with a linear output function. Although Trivium has attached a lot of interest, ...
  • Formulas as programs 

    Burrows, Eva (2003)
    Alma-0 is a programming language supporting declarative programming, which combines the advantages of imperative and logic programming paradigms. This work explores declarative programming by extending the interpretation ...
  • FreeContact: fast and free software for protein contact prediction from residue co-evolution 

    Kaján, László; Hopf, Thomas A.; Kalaš, Matúš; Marks, Debora S.; Rost, Burkhard (BioMed Central, 2014-03-26)
    Background: 20 years of improved technology and growing sequences now renders residue-residue contact constraints in large protein families through correlated mutations accurate enough to drive de novo predictions of protein ...
  • Fusing a Transformation Language with an Open Compiler 

    Kalleberg, Karl Trygve; Visser, Eelco (Elsevier, 2008-04-01)
    Program transformation systems provide powerful analysis and transformation frameworks as well as concise languages for language processing, but instantiating them for every subject language is an arduous task, most often ...
  • Generalized Bent and/or Negabent Constructions 

    Ådlandsvik, Yngve (The University of Bergen, 2012-04-27)
    In this thesis, we generalize the Maiorana-McFarland construction for bent, negabent and bent-negabent Boolean functions and describe a way to computationally search for constructions using these generalizations. We present ...
  • Generating a synthetic diffusion tensor dataset 

    Bergmann, Ørjan; Lundervold, Arvid; Steihaug, Trond (IEEE, 2005)
    During the last years, many techniques for de-noising, segmentation and fiber-tracking have been applied to diffusion tensor MR image data (DTI) from human and animal brains. However, evaluating such methods may be difficult ...
  • Generating tree-like graphs 

    Moldeklev, Elisabeth (The University of Bergen, 2008-11-18)
    Implementation of an algorithm that interactively generates k-graphs, a superclass of k-branches.
  • The genome sequence of Atlantic cod reveals a unique immune system 

    Star, Bastiaan; Nederbragt, Alexander Johan; Jentoft, Sissel; Grimholt, Unni; Malmstrøm, Martin; Gregers, Tone Fredsvik; Rounge, Trine Ballestad; Paulsen, Jonas; Solbakken, Monica Hongrø; Sharma, Animesh; Wetten, Ola Frang; Lanzén, Anders; Winer, Roger; Knight, James; Vogel, Jan-Hinnerk; Aken, Bronwen; Andersen, Øivind; Lagesen, Karin; Tooming-Klunderud, Ave; Edvardsen, Rolf; Kirubakaran, G. Tina; Espelund, Mari; Nepal, Chirag; Previti, A. Christopher; Karlsen, Bård Ove; Moum, Truls; Skage, Morten; Berg, Paul Ragnar; Gjøen, Tor; Kuhl, Heiner; Thorsen, Jim; Malde, Ketil; Reinhardt, Richard; Du, Lei; Johansen, Steinar Daae; Searle, Steve; Lien, Sigbjørn; Nilsen, Frank; Jonassen, Inge; Omholt, Stig W; Stenseth, Nils Christian; Jakobsen, Kjetill Sigurd (Nature Publishing Group, 2011-09)
    Atlantic cod (Gadus morhua) is a large, cold-adapted teleost that sustains long-standing commercial fisheries and incipient aquaculture. Here we present the genome sequence of Atlantic cod, showing evidence for complex ...
  • A geometry-based generic predictor for catalytic and allosteric sites 

    Mitternacht, Simon; Berezovsky, Igor N. (Oxford University Press, 2011)
    An important aspect of understanding protein allostery, and of artificial effector design, is the characterization and prediction of substrate- and effector-binding sites. To find binding sites in allosteric enzymes, many ...
  • Grein. A New Non-Linear Cryptoprimitive 

    Thorsen, Ole Rydland (The University of Bergen, 2013-12-10)
    In this thesis, we will study a new stream cipher, Grein, and a new cryptoprimitive used in this cipher. The second chapter gives a brief introduction to cryptography in general. The third chapter looks at stream ciphers ...
  • Guaranteeing Resource Bounds for Component Software 

    Truong, Anh Hoang (Springer Berlin Heidelberg, 2005-06-15)
    Component software is software that has been assembled from various pieces of standardized, reusable computer programs, so-called components. Executing component software creates instances of these components. For several ...
  • Hash functions in Cryptography 

    Grah, Joseph Sterling (The University of Bergen, 2008)
    This thesis is concerned with giving both an overview of the application of hash functions in cryptography and a presentation of today's standard cryptographic hash functions. Cryptographic hash functions are a valuable ...
  • Hashfunksjoner for bruk i Digitale Signaturer 

    Solvik, Jan Anders (The University of Bergen, 1995)
  • A Hierarchical Splitting Scheme to Reveal Insight into Highly Self-Occluded Integral Surfaces 

    Brambilla, Andrea; Viola, Ivan; Hauser, Helwig (Václav Skala - UNION Agency, 2012)
    In flow visualization, integral surfaces are of particular interest for their ability to describe trajectories of massless particles. In areas of swirling motion, integral surfaces can become very complex and difficult ...