• Wireless security and user attitude in SOHO environments 

      Santucci, Ugo (Master thesis, 2006)
      Wireless telecommunications networks have been one of the outstanding success stories over the last decade or so. Wireless Local Area Networks (WLANs) are reaching the same success in a very short time.[1] Corporate and ...
    • Epidemic network and centrality 

      Rustam, Akram Hussain (Master thesis, 2006)
      This project is about epidemics spreading in computer networks and the issue of node centrality. The aim of such analysis is to investigate the rate of infection and information spreading in the network, to find the most ...
    • Generating synthetic VoIP traffic for analyzing redundant OpenBSD-Firewalls 

      Woernhard, Maurice David (Master thesis, 2006)
      Voice over IP, short VoIP, is among the fastest growing broadband technologies in the private and commercial sector. Compared to the Plain Old Telephone System (POTS), Internet telephony has reduced availability, measured ...
    • Exploring 3-dimentional visualization of the data sets collected by cfEngine 

      Semenov, Alexander (Master thesis, 2006)
      cfEngine or Configuration Engine is an administration tool used to configure and maintain computer systems. There is a part of cfEngine that is responsible for collection of information about systems’ state. As a result, ...
    • Management of high availability services using virtualization 

      Braastad, Espen (Master thesis, 2006)
      This thesis examines the use of virtualization in management of high availability services using open source tools. The services are hosted in virtual machines, which can be seamlessly migrated between the physical nodes ...
    • Utsmykking av trapperom ved Vindingstad skole Gjøvik 

      Lundberg, Liv Anne; Andersen, Kyrre (Visual arts, 2006)
    • Glasskunst: Kolbotn kultur- og aktivitetssenter 

      Andersen, Kyrre; Lundberg, Liv Anne (Visual arts, 2006)
    • Exploring patterns for scalability of network administration with topology constraints 

      Disney, Matthew (Master thesis, 2007)
      This thesis considers the impact of distributed network communication patterns on the scalability of dynamic systems configuration and monitoring using the software cfengine. Decentralized patterns are partially ...
    • (est)etikk takk! Om holdninger til og kunnskaper om design 

      Lefdal, Else Margrethe (Master thesis, 2007)
      Masteroppgave 2007 nr 15: Masteroppgaven handler om; - etisk design; at brukersentrert design, økologisk design, universell design er etiske designbegreper. I oppgaven argumenteres det for; økt breddeforståelse for design, ...
    • Families of Artinian and one-dimensional algebras 

      Kleppe, Jan Oddvar (Journal of Algebra;311, Journal article; Peer reviewed, 2007)
      The purpose of this paper is to study families of Artinian or one dimensional quotients of a polynomial ring R with a special look to level algebras. Let GradAlg^H(R) be the scheme parametrizing graded quotients of R with ...
    • Presenting a prototype for pull based load balancing of web servers 

      Berggren, Arild (Master thesis, 2007)
      The traffic and the number of users on the Internet are increasing, and service providers must respond to this demand if they are not to loose both customers and revenue. In order to provide a satisfactory level of QoS, ...
    • A comparison of management of virtual machines with z/VM and ESX Server 

      Opsahl, Christer (Master thesis, 2007)
      Virtualization and virtual machines are becoming more and more important for businesses. By consolidating many servers to run as virtual machine on a single host companies can save considerable amounts on money. The ...
    • Vurderingskompetanse i faglærerutdanningen - vekselspill eller kokong? 

      Lutnæs, Eva (Master thesis, 2007)
      I denne masteroppgaven er fokuset lagt på utviklingen av studenters vurderingskompetanse gjennom den 3-årige faglærerutdanningen i formgiving, kunst og håndverk. Med utgangspunkt i en fagdidaktikkdefinisjon (Ongstad ...
    • Towards an ontology for system administration case study : backup operation 

      Ntieche, Karim Sani (Master thesis, 2007)
      With the multiplicity of operating systems it is becoming common practice for organizations to deploy heterogeneous systems environments in order to benefit from their different advantages. The tradeoff of building ...
    • User and group profiling based on user process usage 

      Ochoa, Edson (Master thesis, 2007)
      User profiling based on process usage is on approach for adding an extra security layer to our computer systems. In addition it can be of great value for classification of a company/school network and the their user ...
    • Exporting IP flows using IPFIX 

      Juvhaugen, Per (Master thesis, 2007)
      Todays computer networks are continuously expanding both in size and capacity to accommodate the demands of the traffic they are designed to handle. Depending on the needs of the network operator, different aspects of ...
    • Unobstructedness and dimension of families of codimension 3 ACM algebras 

      Kleppe, Jan Oddvar; Miro-Roig, Rosa Maria (Contemporary Mathematics;448, Journal article; Peer reviewed, 2007)
      The goal of this paper is to study irreducible families of codimension 3, Cohen-Macaulay quotients A of a polynomial ring R=k[x_0,x_1,...,x_n]; mainly, we study families of graded Cohen-Macaulay quotients A of codimension ...
    • Unobstructedness and dimension of families of Gorenstein algebras 

      Kleppe, Jan Oddvar (Collectanea Mathematica; 58(2), Journal article; Peer reviewed, 2007)
      The goal of this paper is to develop tools to study maximal families of Gorenstein quotients A of a polynomial ring R. We prove a very general Theorem on deformations of the homogeneous coordinate ring of a scheme Proj A ...
    • Biometric Authentication and Identification using Keystroke Dynamics with Alert Levels 

      Andersen, Aleksander Sveløkken (Master thesis, 2007)
      Proper authentication is needed to avoid theft and destruction of data by unauthorized parties. This research proposes to add software biometrics to the authentication and verification process, using keystroke dynamics. ...
    • Ontology for host-based anomaly detection 

      Adaa, Margareth Pancras (Master thesis, 2007)
      This project is about the description of ontologies for anomaly detection in computer systems. The special case of the anomaly detection system in Cfengine is used as a case study. Cfengine was designed at Oslo University ...