BORA - UiB

Bergen Open Research Archive

Browsing Department of Informatics by Title

Bergen Open Research Archive

Browsing Department of Informatics by Title

Sort by: Order: Results:

  • Knudsen, Joakim Grahl (Master thesis, The University of Bergen, 2005-11-30)
  • Gjendemsjø, Anders; Øien, Geir Egil; Holm, Henrik; Alouini, Mohamed-Slim; Gesbert, David; Hole, Kjell Jørgen; Orten, Pål (Journal article, Springer, 2008-01-09)
    Link adaptation, in particular adaptive coded modulation (ACM), is a promising tool for bandwidth-efficient transmission in a fading environment. The main motivation behind employing ACM schemes is to improve the spectral ...
  • Nilsen, Geir Kjetil (Master thesis, The University of Bergen, 2008-11-18)
    A fast algorithm for producing time-frequency representations (TFRs) is proposed. The resulting TFRs have optional time-frequency resolution up to optimality. The algorithm is further extended with a method known as ...
  • Bagge, Anya Helene; Lämmel, Ralf; Zaytsev, Vadim (Conference object, 2014)
    Software Language Engineering (SLE) has emerged as a field in computer science research and software engineering, but it has yet to become entrenched as part of the standard curriculum at universities. Many places have a ...
  • Hovland, Dag (Chapter; Peer reviewed, Springer, 2009)
    Regular expressions with numerical constraints are an extension of regular expressions, allowing to bound numerically the number of times that a subexpression should be matched. Expressions in this extension describe the ...
  • Nepal, Chirag (Doctoral thesis, The University of Bergen, 2013-05-03)
    For many years, RNAs were thought to be intermediate products between DNA and protein. The discovery of RNA interference (RNAi), a regulatory process that uses small non-coding RNAs to regulate gene expression at the ...
  • Malde, Ketil; Jonassen, Inge (Journal article, BioMed Central, 2008-01-18)
    Background Repeat masking is an important step in the EST analysis pipeline. For new species, genomic knowledge is scarce and good repeat libraries are typically unavailable. In these cases it is common practice to mask ...
  • Klingsheim, André N. (Doctoral thesis, The University of Bergen, 2008-09-24)
    Networked computer systems yield great value to businesses and governments, but also create risks. The eight papers in this thesis highlight vulnerabilities in computer systems that lead to security and privacy risks. A ...
  • Knudtsen, Christian Skauge (Master thesis, The University of Bergen, 2003)
  • Eichner, Christiane; Frost, Petter; Dysvik, Bjarte; Jonassen, Inge; Kristiansen, Bjørn; Nilsen, Frank (Peer reviewed; Journal article, BioMed Central, 2008-03-10)
    Background Lepeophtheirus salmonis is an ectoparasitic copepod feeding on skin, mucus and blood from salmonid hosts. Initial analysis of EST sequences from pre adult and adult stages of L. salmonis revealed a large ...
  • Myrtveit, Magnar (Master thesis, The University of Bergen, 2014-11-20)
    Recommender systems appear in a large variety of applications, and their use has become very common in recent years. As a lot of money can be made by companies having a better recommender system than their competitors, ...
  • Tjøstheim, Thomas (Doctoral thesis, The University of Bergen, 2007-08-29)
    The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, ...
  • Abyaneh, Mohammad Reza Sohizadeh (Doctoral thesis, The University of Bergen, 2012-08-08)
    This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ...
  • Abyaneh, Mohammad Reza Sohizadeh (Conference object, The author, 2012)
    In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestima ...
  • Valvik, Remi André Bognøy (Master thesis, The University of Bergen, 2012-02-24)
    The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ...
  • Patel, Daniel; Giertsen, Christopher; Thurmond, John; Gjelberg, John; Gröller, Eduard (Journal article; Peer reviewed, IEEE Computer Society, 2008)
    We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify ...
  • Wang, Shuang (Master thesis, The University of Bergen, 2008-11-10)
    Many problems of practical interest can be modeled as coloring problems. For example, when you are making a phone call using a mobile phone, it needs to transform the voice signal into an electronic wireless signal. Eachsuch ...
  • Solem, Tom Martens Meyer (Master thesis, The University of Bergen, 2004)
  • Bagge, Anya Helene (Chapter, IEEE, 2012)
    Traditional error handling mechanisms, including exceptions, have several weaknesses that interfere with maintainability, flexibility and genericity in software: Error code is tangled with normal code; reporting is ...
  • Li, Chunlei (Doctoral thesis, The University of Bergen, 2014-06-16)
    Due to optimal nonlinearity and differential uniformity, perfect nonlinear (PN) and almost perfect nonlinear (APN) functions are of great importance in cryptography. It is interesting that they also define optimal objects ...

Search BORA


Browse

My Account