Now showing items 196-215 of 273

  • Randomised Construction and Dynamic Decoding of LDPC Codes 

    Knudsen, Joakim Grahl (The University of Bergen, 2005-11-30)
    Master thesis
  • Rate and power allocation for discrete-rate link adaptation 

    Gjendemsjø, Anders; Øien, Geir Egil; Holm, Henrik; Alouini, Mohamed-Slim; Gesbert, David; Hole, Kjell Jørgen; Orten, Pål (Springer, 2008-01-09)
    Link adaptation, in particular adaptive coded modulation (ACM), is a promising tool for bandwidth-efficient transmission in a fading environment. The main motivation behind employing ACM schemes is to improve the spectral ...
    Journal article
  • Recursive Time-Frequency Reassignment 

    Nilsen, Geir Kjetil (The University of Bergen, 2008-11-18)
    A fast algorithm for producing time-frequency representations (TFRs) is proposed. The resulting TFRs have optional time-frequency resolution up to optimality. The algorithm is further extended with a method known as ...
    Master thesis
  • Reflections on Courses for Software Language Engineering 

    Bagge, Anya Helene; Lämmel, Ralf; Zaytsev, Vadim (2014)
    Software Language Engineering (SLE) has emerged as a field in computer science research and software engineering, but it has yet to become entrenched as part of the standard curriculum at universities. Many places have a ...
    Conference object
  • Regular Expressions with Numerical Constraints and Automata with Counters 

    Hovland, Dag (Springer, 2009)
    Regular expressions with numerical constraints are an extension of regular expressions, allowing to bound numerically the number of times that a subexpression should be matched. Expressions in this extension describe the ...
    ChapterPeer reviewed
  • Regulatory mechanisms of non-coding RNAs during zebrafish embryogenesis 

    Nepal, Chirag (The University of Bergen, 2013-05-03)
    For many years, RNAs were thought to be intermediate products between DNA and protein. The discovery of RNA interference (RNAi), a regulatory process that uses small non-coding RNAs to regulate gene expression at the ...
    Doctoral thesis
  • Repeats and EST analysis for new organisms 

    Malde, Ketil; Jonassen, Inge (BioMed Central, 2008-01-18)
    Background Repeat masking is an important step in the EST analysis pipeline. For new species, genomic knowledge is scarce and good repeat libraries are typically unavailable. In these cases it is common practice to mask ...
    Journal article
  • Risks in Networked Computer Systems 

    Klingsheim, André N. (The University of Bergen, 2008-09-24)
    Networked computer systems yield great value to businesses and governments, but also create risks. The eight papers in this thesis highlight vulnerabilities in computer systems that lead to security and privacy risks. A ...
    Doctoral thesis
  • Rotasjonsinvariante turbokoder 

    Knudtsen, Christian Skauge (The University of Bergen, 2003)
    Master thesis
  • Salmon louse (Lepeophtheirus salmonis) transcriptomes during post molting maturation and egg production, revealed using EST-sequencing and microarray analysis 

    Eichner, Christiane; Frost, Petter; Dysvik, Bjarte; Jonassen, Inge; Kristiansen, Bjørn; Nilsen, Frank (BioMed Central, 2008-03-10)
    Background Lepeophtheirus salmonis is an ectoparasitic copepod feeding on skin, mucus and blood from salmonid hosts. Initial analysis of EST sequences from pre adult and adult stages of L. salmonis revealed a large ...
    Peer reviewedJournal article
  • Scaling the scales - A suggested improvement to IBM's Intelligent Recommendation Algorithm 

    Myrtveit, Magnar (The University of Bergen, 2014-11-20)
    Recommender systems appear in a large variety of applications, and their use has become very common in recent years. As a lot of money can be made by companies having a better recommender system than their competitors, ...
    Master thesis
  • The Second Rewrite Engines Competition 

    Durán, Francisco; Roldán, Manuel; Balland, Emilie; van den Brand, Mark; Eker, Steven; Kalleberg, Karl Trygve; Kats, Lennart C. L.; Moreau, Pierre-Etienne; Schevchenko, Ruslan; Visser, Eelco (Elsevier, 2009-06-29)
    The Second Rewrite Engines Competition (REC) was celebrated as part of the 7th Workshop on Rewriting Logic and its Applications (WRLA 2008). In this edition of the competition participated five systems, namely ASF+SDF, ...
    Journal article
  • Security analysis of electronic voting and online banking systems 

    Tjøstheim, Thomas (The University of Bergen, 2007-08-29)
    The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, ...
    Doctoral thesis
  • Security Analysis Of Lightweight Schemes for RFID Systems 

    Abyaneh, Mohammad Reza Sohizadeh (The University of Bergen, 2012-08-08)
    This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ...
    Doctoral thesis
  • Security Analysis of two Distance-Bounding Protocols 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestima ...
    Conference object
  • Security API for Java ME: secureXdata 

    Valvik, Remi André Bognøy (The University of Bergen, 2012-02-24)
    The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ...
    Master thesis
  • The Seismic Analyzer: Interpreting and Illustrating 2D Seismic Data 

    Patel, Daniel; Giertsen, Christopher; Thurmond, John; Gjelberg, John; Gröller, Eduard (IEEE Computer Society, 2008)
    We present a toolbox for quickly interpreting and illustrating 2D slices of seismic volumetric reflection data. Searching for oil and gas involves creating a structural overview of seismic reflection data to identify ...
    Journal articlePeer reviewed
  • Self-stabilizing algorithms for the distance-k coloring problem 

    Wang, Shuang (The University of Bergen, 2008-11-10)
    Many problems of practical interest can be modeled as coloring problems. For example, when you are making a phone call using a mobile phone, it needs to transform the voice signal into an electronic wireless signal. Eachsuch ...
    Master thesis
  • Selvstabiliserende algoritmer for frekvensallokering 

    Solem, Tom Martens Meyer (The University of Bergen, 2004)
    Master thesis
  • Separating Exceptional Concerns 

    Bagge, Anya Helene (IEEE, 2012)
    Traditional error handling mechanisms, including exceptions, have several weaknesses that interfere with maintainability, flexibility and genericity in software: Error code is tangled with normal code; reporting is ...