BORA - UiB

Bergen Open Research Archive

Browsing Department of Informatics by Title

Bergen Open Research Archive

Browsing Department of Informatics by Title

Sort by: Order: Results:

  • Ganeshan, Vithya (Master thesis, The University of Bergen, 2015-03-03)
    In transportation networks, such as pipeline networks for transporting natural gas, it is often impractical to send across amounts of flow below a certain threshold. Such lower threshold is referred as the minimum-lot size. ...
  • Kejriwal, Anisha (Master thesis, The University of Bergen, 2014-05-31)
    In pipeline transportation of natural gas, simple network flow problems are replaced by hard ones when bounds on the flow quality are imposed. The sources, typically represented by gas wells, provide flow of unequal ...
  • Hovland, Dag (Doctoral thesis, The University of Bergen, 2010-12-16)
  • Balzer, Susanne Mignon; Malde, Ketil; Grohme, Markus A.; Jonassen, Inge (Peer reviewed; Journal article, Oxford University Press, 2013)
    Motivation: Throughout the recent years, 454 pyrosequencing has emerged as an efficient alternative to traditional Sanger sequencing and is widely used in both de novo whole-genome sequencing ...
  • Pobitzer, Armin; Peikert, Ronald; Fuchs, Raphael; Theisel, Holger; Hauser, Helwig (Peer reviewed; Journal article, Springer, 2012)
    In many cases, feature detection for flow visualization is structured in two phases: first candidate identification, and then filtering. With this paper, we propose to use the directional information contained in the ...
  • Fellows, Mike; Heggernes, Pinar; Rosamond, Frances; Sloper, Christian; Telle, Jan Arne (Springer Verlag, 2004)
  • Truong, Anh Hoang; Bezem, Marcus A. (Journal article, Springer Berlin Heidelberg, 2005-10-17)
    A software program requesting a resource that is not available usually raises an out-of-resource exception. Component software is software that has been assembled from standardized, reusable components which, in turn, may ...
  • Lokshtanov, Daniel; Sloper, Christian (2005)
  • Hojsík, Michal; Rudolf, Bohuslav (Chapter; Peer reviewed, Springer Berlin Heidelberg, 2008)
    One of the eSTREAM final portfolio ciphers is the hardwareoriented stream cipher Trivium. It is based on 3 nonlinear feedback shift registers with a linear output function. Although Trivium has attached a lot of interest, ...
  • Burrows, Eva (Master thesis, 2003)
    Alma-0 is a programming language supporting declarative programming, which combines the advantages of imperative and logic programming paradigms. This work explores declarative programming by extending the interpretation ...
  • Kaján, László; Hopf, Thomas A.; Kalaš, Matúš; Marks, Debora S.; Rost, Burkhard (Journal article, BioMed Central, 2014-03-26)
    Background: 20 years of improved technology and growing sequences now renders residue-residue contact constraints in large protein families through correlated mutations accurate enough to drive de novo predictions of ...
  • Kalleberg, Karl Trygve; Visser, Eelco (Journal article, Elsevier, 2008-04-01)
    Program transformation systems provide powerful analysis and transformation frameworks as well as concise languages for language processing, but instantiating them for every subject language is an arduous task, most ...
  • Ådlandsvik, Yngve (Master thesis, The University of Bergen, 2012-04-27)
    In this thesis, we generalize the Maiorana-McFarland construction for bent, negabent and bent-negabent Boolean functions and describe a way to computationally search for constructions using these generalizations. We present ...
  • Bergmann, Ørjan; Lundervold, Arvid; Steihaug, Trond (Peer reviewed; Journal article, IEEE, 2005)
    During the last years, many techniques for de-noising, segmentation and fiber-tracking have been applied to diffusion tensor MR image data (DTI) from human and animal brains. However, evaluating such methods may be difficult ...
  • Moldeklev, Elisabeth (Master thesis, The University of Bergen, 2008-11-18)
    Implementation of an algorithm that interactively generates k-graphs, a superclass of k-branches.
  • Mitternacht, Simon; Berezovsky, Igor N. (Journal article; Peer reviewed, Oxford University Press, 2011)
    An important aspect of understanding protein allostery, and of artificial effector design, is the characterization and prediction of substrate- and effector-binding sites. To find binding sites in allosteric enzymes, many ...
  • Thorsen, Ole Rydland (Master thesis, The University of Bergen, 2013-12-10)
    In this thesis, we will study a new stream cipher, Grein, and a new cryptoprimitive used in this cipher. The second chapter gives a brief introduction to cryptography in general. The third chapter looks at stream ciphers ...
  • Truong, Anh Hoang (Journal article, Springer Berlin Heidelberg, 2005-06-15)
    Component software is software that has been assembled from various pieces of standardized, reusable computer programs, so-called components. Executing component software creates instances of these components. For several ...
  • Grah, Joseph Sterling (Master thesis, The University of Bergen, 2008)
    This thesis is concerned with giving both an overview of the application of hash functions in cryptography and a presentation of today's standard cryptographic hash functions. Cryptographic hash functions are a valuable ...
  • Solvik, Jan Anders (Master thesis, The University of Bergen, 1995)

Search BORA


Browse

My Account