• Sex‑Specifc Diferences in Mortality of Patients with a History of Bariatric Surgery: a Nation‑Wide Population‑Based Study 

      Beiglböck, Hannes; Mörth, Eric; Reichardt, Berthold; Stamm, Tanja; Itariu, Bianca; Harreiter, Jürgen; Hufgard-Leitner, Miriam; Fellinger, Paul; Eichelter, Jakob; Prager, Gerhard; Kautzky, Alexander; Kautzky-Willer, Alexandra; Wolf, Peter; Krebs, Michael (Journal article; Peer reviewed, 2022)
      Purpose Bariatric surgery reduces mortality in patients with severe obesity and is predominantly performed in women. Therefore, an analysis of sex-specific differences after bariatric surgery in a population-based dataset ...
    • The SHIP Validator: An Annotation-based Content-Validation Framework for Java Applications 

      Mancini, Federico; Hovland, Dag; Mughal, Khalid A. (Chapter; Peer reviewed, 2010)
      In this paper, we investigate the use of Java annotations for software security purposes. In particular, we implement a framework for content validation where the validation tests are specified by annotations. This approach ...
    • Shoelaces: An interactive tool for ribosome profiling processing and visualization 

      Birkeland, Åsmund; Chyzynska, Katarzyna; Valen, Eivind (Peer reviewed; Journal article, 2018-07-18)
      Background: The emergence of ribosome profiling to map actively translating ribosomes has laid the foundation for a diverse range of studies on translational regulation. The data obtained with different variations of this ...
    • Short-term Spatiotemporal Load Forecasting for Norwegian Bidding Zones 

      Følid, Atle (Master thesis, 2021-06-01)
      Short-term load forecasting is vital for electric utility companies. The objective of this thesis is the short-term load forecasting of the five bidding zones in the Norwegian electrical grid. This master thesis proposes ...
    • Side Channel Analysis on Bitsliced AES 

      Husum, Stian Johannesen (Master thesis, 2022-06-01)
      The current power analysis attacks on bitsliced AES only take into account the power consumption of a single bit. We present a way of combining multiple Differential Power Analysis attacks using different power models to ...
    • Similarity-based Exploded Views 

      Ruiz, Marc; Viola, Ivan; Boada, Imma; Bruckner, Stefan; Feixas, Miquel; Sbert, Mateu (Lecture Notes in Computer Science; 5166, Chapter; Peer reviewed, 2008)
      Exploded views are often used in illustration to overcome the problem of occlusion when depicting complex structures. In this paper, we propose a volume visualization technique inspired by exploded views that partitions ...
    • A simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB 

      Rayner, Tim F.; Rocca-Serra, Philippe; Spellman, Paul T.; Causton, Helen C.; Farne, Anna; Holloway, Ele; Irizarry, Rafael A.; Liu, Junmin; Maier, Donald S.; Miller, Michael; Petersen, Kjell; Quackenbush, John; Sherlock, Gavin; Stoeckert, Christian J. Jr; White, Joseph; Whetzel, Patricia L.; Wymore, Farrell; Parkinson, Helen; Sarkans, Ugis; Ball, Catherine A.; Brazma, Alvis (Peer reviewed; Journal article, 2006-11-06)
      Background: Sharing of microarray data within the research community has been greatly facilitated by the development of the disclosure and communication standards MIAME and MAGEML by the MGED Society. However, the complexity ...
    • Simplicity conditions for binary orthogonal arrays 

      Carlet, Claude Michael; Kiss, Rebeka; Nagy, Gábor P. (Journal article; Peer reviewed, 2023)
      It is known that correlation-immune (CI) Boolean functions used in the framework of side channel attacks need to have low Hamming weights. The supports of CI functions are (equivalently) simple orthogonal arrays, when their ...
    • Simplified Computer Interaction Using Mixed Reality 

      Balabanian, Jean-Paul (Master thesis, 2004)
      This thesis describes a system for mixing reality, as captured by a camera, with a virtual 3-dimensional world. A system to recognize and track a square pattern of markers is created in order to obtain the extrinsic ...
    • Simulating Private Information Retrieval on Amazon Web Services 

      Rygnestad, Eirik Bergesen (Master thesis, 2023-09-15)
      As our modern lives have gradually moved more and more online, companies and state actors have taken it upon themselves to gather and analyze our behavior online, and as these actors have gradually shown just how much they ...
    • Simulation and analysis of clustering for proton CT 

      Grimstad, Silje (Master thesis, 2019-06-29)
      A research team in Bergen in collaboration with others is working to develop a proton Computed Tomography (pCT) prototype. It is an image modality that uses proton rather than x-ray to create a CT-image. This can lead to ...
    • Site Sonar - A monitoring tool for ALICE’s Grid Sites 

      Sandvik, Even Berge (Master thesis, 2021-12-17)
      As the data collected by the LHC increases, the demand for computing resources follow. The JAliEn middleware was created to handle the high-throughput of data expected from ALICE in Run 3. However, making the sites in ...
    • Skaping av meirverdi gjennom opne data om kollektivtrafikk 

      Bergheim, Livar (Master thesis, 2015-05-04)
      Tema i denne oppgåva er opne data, med ei avgrensing mot kollektivtrafikkdata. Djupnestudien er retta mot verksemda til Skyss, det fylkeskommunale kollektivtrafikkselskapet i Hordaland. Omgrepet opne data" inneber at andre ...
    • Sketch-based Modelling and Conceptual Visualization of Geomorphological Processes for Interactive Scientific Communication 

      Natali, Mattia (Doctoral thesis, 2014-09-19)
      Throughout this dissertation, solutions for rapid digitalization of ideas will be defined. More precisely, the focus is on interactive scientific sketching and communication of geology, where the result is a digital ...
    • Sketch-based Storytelling for Cognitive Problem Solving: Externalization, Evaluation, and Communication in Geology 

      Lidal, Endre Mølster (Doctoral thesis, 2013-06-25)
      PROBLEM solving is an important part of all engineering and scientific activities. It is present, for instance, when experts want to develop more fuel-efficient cars or when they are searching for oil and gas in the ...
    • Small Open Reading Frames, How to Find Them and Determine Their Function 

      Kute, Preeti; Soukarieh, Omar; Tjeldnes, Håkon; Trégouët, David-Alexandre; Valen, Eivind Dale (Journal article; Peer reviewed, 2022)
      Advances in genomics and molecular biology have revealed an abundance of small open reading frames (sORFs) across all types of transcripts. While these sORFs are often assumed to be non-functional, many have been implicated ...
    • Smart Surrogate Widgets for Direct Volume Manipulation 

      Stoppel, Sergej; Bruckner, Stefan (Peer reviewed; Journal article, 2018)
      Interaction is an essential aspect in volume visualization, yet common manipulation tools such as bounding boxes or clipping plane widgets provide rather crude tools as they neglect the complex structure of the underlying ...
    • SmartSwarm - A Multi-Agent Reinforcement Learning based Particle Swarm Optimization Algorithm 

      Mostein, Herman Jangsett (Master thesis, 2023-06-01)
      Particle Swarm Optimization is a renowned continuous optimization method that utilizes Swarm Intelligence to find solutions to complex non-linear optimization problems efficiently. Since its proposal, many developments ...
    • sMolBoxes: Dataflow Model for Molecular Dynamics Exploration 

      Ulbrich, Pavol; Waldner, Manuela; Furmanová, Katarína; Marques, Sergio M.; Bednář, David; Kozlíková, Barbora; Byska, Jan (Journal article; Peer reviewed, 2023)
      We present sMolBoxes, a dataflow representation for the exploration and analysis of long molecular dynamics (MD) simulations. When MD simulations reach millions of snapshots, a frame-by-frame observation is not feasible ...
    • SMS One-Time Passwords, Security in Two-Factor Authentication 

      Eide, Jan-Erik Lothe (Master thesis, 2015-05-29)
      In the past decade, the low price and ease of generating and sending large amounts of SMS have made it possible for many online services to create strong and affordable authentication systems. With the growth of smartphones ...