• Automatic security classification by machine learning for cross-domain information exchange 

      Hammer, Hugo Lewi; Kongsgård, Kyrre Wahl; Yazidi, Anis; Bai, Aleksander; Nordbotten, Nils Agne; Engelstad, Paal E. (MILCOM IEEE Military Communications Conference;, Journal article; Peer reviewed, 2015)
      Cross-domain information exchange is necessary to obtain information superiority in the military domain, and should be based on assigning appropriate security labels to the information objects. Most of the data found ...
    • An automatic two-hand 2d:4dD finger-ratio measurement algorithm for flatbed scanned images 

      Sandnes, Frode Eika (Peer reviewed; Chapter, 2015)
      Abstract— There is a vast body of research based on 2D:4D finger ratio measurements within the fields of medicine, physiology, and several other disciplines. There are well-known conventions for how such finger measures ...
    • Automatic Unsupervised Clustering of Videos of the Intracytoplasmic Sperm Injection (ICSI) Procedure 

      Storås, Andrea; Riegler, Michael Alexander; Haugen, Trine B.; Thambawita, Vajira L B; Hicks, Steven Alexander; Hammer, Hugo Lewi; Kakulavarapu, Radhika; Halvorsen, Pål; Stensen, Mette Haug (Chapter; Conference object, 2023)
      The in vitro fertilization procedure called intracytoplasmic sperm injection can be used to help fertilize an egg by injecting a single sperm cell directly into the cytoplasm of the egg. In order to evaluate, refine and ...
    • Automatically generated interactive weather reports based on webcam images 

      Sandnes, Frode Eika; Pettersen, Kim Andre; Skaufel, Espen; Haugstad, Erling (Norsk Informatikkonferanse;, Journal article; Peer reviewed, 2011-11-20)
      Most weather reports are either based on data from dedicated weather stations, satellite images, manual measurements or forecasts. In this paper a system that automatically generates weather reports using the contents on ...
    • Autonomous configuration of network parameters in operating systems using evolutionary algorithms 

      Gembala, Bartosz Gembala; Yazidi, Anis; Haugerud, Hårek; Nichele, Stefano (Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems;, Chapter; Peer reviewed, 2018)
      By default, the Linux network stack is not configured for highspeed large file transfer. The reason behind this is to save memory resources. It is possible to tune the Linux network stack by increasing the network buffers ...
    • Avoiding product abandonment through user centered design: A case study involving the development of a 3D printed customized upper limb prosthesis 

      Figliolia, Amanda; Medola, Fausto Orsi; Sandnes, Frode Eika; Rodrigues, Ana Claudia Tavares; Paschoarelli, Luis Carlos (Advances in Intelligent Systems and Computing;volume 975, Chapter; Peer reviewed, 2019-06-05)
      This study reports on experiences with a user centered design approach for the development of a customized mechanical transradial prosthesis for a patient who were unable to adapt to a standard prosthesis. The development ...
    • Balanced difficulty task finder: an adaptive recommendation method for learning tasks based on the concept of state of flow 

      Yazidi, Anis; Abolpour Mofrad, Asieh; Goodwin, Morten; Hammer, Hugo Lewi; Arntzen, Erik (Cognitive Neurodynamics;14, Journal article; Peer reviewed, 2020-08-27)
      An adaptive task difficulty assignment method which we reckon as balanced difficulty task finder (BDTF) is proposed in this paper. The aim is to recommend tasks to a learner using a trade-off between skills of the learner and ...
    • Bayesian lithology/fluid inversion - comparison of two algorithms 

      Ulvmoen, Marit; Hammer, Hugo Lewi (Computational Geosciences;14(2), Journal article; Peer reviewed, 2010)
      Algorithms for inversion of seismic prestack AVO data into lithology-fluid classes in a vertical profile are evaluated. The inversion is defined in a Bayesian setting where the prior model for the lithology-fluid classes ...
    • Beauty in the eye of the beholder? A client-centric framework for the assessment of professional service firms knowledge assets 

      Skjølsvik, Tale; Breunig, Karl Joachim (Proceedings IFKAD;1, Journal article; Peer reviewed, 2015)
      Purpose – This empirical paper explores how professional competence s are defined and assessed by clients of professional service firms . Ex tant research ha s captured how t he formal knowledge ...
    • Before and after Lightfoot/León. Using rich pictures to illustrate an educational journey through the world of opera and ballet 

      Habib, Laurence Marie Anna; Juell, Elisabeth (FORMakademisk;7(5), Journal article; Peer reviewed, 2014)
      In this article, we describe part of an action research project carried out during a classroom-based art course at a higher education institution. We gave the students themed collaborative drawing assignments, with the ...
    • Bianchi type-I universe model with nonlinear viscosity 

      Mostafapoor, Nouraddin; Grøn, Øyvind (Journal article; Peer reviewed, 2012-08-23)
      In this paper we study the evolution of spatially homogeneous and anisotropic Bianchi type-I Universe models with the cosmological constant, Λ, and filled with nonlinearviscous fluid. The dynamical equations for these ...
    • A bibliometric study of human–computer interaction research activity in the Nordic-Baltic Eight countries 

      Sandnes, Frode Eika (Scientometrics;126, pages 4733–4767 (2021), Peer reviewed; Journal article, 2021-04-26)
      Human–computer interaction (HCI) has become an important area for designers and developers worldwide, and research activities set in national cultural contexts addressing local challenges are often needed in industry and ...
    • Bidirectional Learning for Robust Neural Networks 

      Pontes-Filho, Sidney; Liwicki, Marcus (Neural Networks (IJCNN), International Joint Conference on; 2019 International Joint Conference on Neural Networks (IJCNN), Chapter; Peer reviewed, 2019)
      A multilayer perceptron can behave as a generative classifier by applying bidirectional learning (BL). It consists of training an undirected neural network to map input to output and vice-versa; therefore it can produce a ...
    • Big Data Pipelines on the Computing Continuum: Ecosystem and Use Cases Overview 

      Roman, Dumitru; Nikolov, Nikolay; Soylu, Ahmet; Elvesæter, Brian; Song, Hui; Prodan, Radu; Kimovski, Dragi; Marrella, Andrea; Leotta, Francesco; Matskin, Mihhail; Ledakis, Giannis; Theodosiou, Konstantinos; Simonet-Boulogne, Anthony; Perales, Fernando; Kharlamov, Evgeny; Ulisses, Alexandre; Solberg, Arnor; Ceccarelli, Raffaele (Proceedings of the IEEE Symposium on Computers and Communications;2021 IEEE Symposium on Computers and Communications (ISCC), Peer reviewed; Journal article, 2021-12-15)
      Organisations possess and continuously generate huge amounts of static and stream data, especially with the proliferation of Internet of Things technologies. Collected but unused data, i.e., Dark Data, mean loss in value ...
    • Big Data Pipelines on the Computing Continuum: Tapping the Dark Data 

      Roman, Dumitru; Prodan, Radu; Nikolov, Nikolay; Soylu, Ahmet; Matskin, Mihhail; Marrella, Andrea; Kimovski, Dragi; Elvesæter, Brian; Simonet-Boulogne, Anthony; Ledakis, Giannis; Song, Hui; Leotta, Francesco; Kharlamov, Evgeny (Computer;Volume: 55, Issue: 11, Peer reviewed; Journal article, 2022-10-25)
      Big Data pipelines are essential for leveraging Dark Data, i.e., data collected but not used and turned into value. However, tapping their potential requires going beyond existing approaches and frameworks for Big Data ...
    • Big data workflows: Locality-aware orchestration using software containers 

      Corodescu, Andrei-Alin; Nikolov, Nikolay; Khan, Akif Quddus; Soylu, Ahmet; Matskin, Mihhail; Payberah, Amir H.; Roman, Dumitru (Sensors;Volume 21 / Issue 24, Peer reviewed; Journal article, 2021-12-08)
      The emergence of the Edge computing paradigm has shifted data processing from centralised infrastructures to heterogeneous and geographically distributed infrastructures. Therefore, data processing solutions must consider ...
    • Branded selves : how children in Norway relate to marketing on a social network site 

      Skaar, Håvard (Journal of children and media;3 (3), Journal article; Peer reviewed, 2009-07-22)
      Theories of branding and self presentation inform an ethnographic study of how a group of classmates aged 11–12 construct identities by use of the brands and branded resources made available to them on the social network ...
    • BRIDGE: Administering Small Anonymous Longitudinal HCI Experiments with Snowball-type Sampling 

      Sandnes, Frode Eika (Lecture Notes in Computer Science;Volume 12935, Conference object, 2021-08-26)
      When following participants across multiple sessions one needs a way to link the different session records while protecting the participants’ privacy. Privacy is required by recent legislation such as the General Data ...
    • Bridging between load-flow and Kuramoto-like power grid models: A flexible approach to integrating electrical storage units 

      Schmietendorf, Katrin; Kamps, Oliver; Wolff, Matthias; Lind, Pedro; Maass, Philipp; Peinke, Joachim (Chaos: An Interdisciplinary Journal of Nonlinear Science ;Volume 29, Issue 10, Journal article; Peer reviewed, 2019-08-16)
      In future power systems, electrical storage will be the key technology for balancing feed-in fluctuations. With increasing share of renewables and reduction of system inertia, the focus of research expands toward short-term ...
    • Bringing 5G Into User's Smart Home 

      Dzogovic, Bruno; Jacot, Niels; Santos, Bernardo; Do, Thuan Van; Feng, Boning; Do, van Thanh (IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC);2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Chapter; Peer reviewed; Conference object, 2019)
      A successful 5G Smart Home must be able to support 5G devices along with WLAN devices. This is not possible with the 5G specifications, and to remedy the situation, this paper proposes a 5G Smart Home Solution that combines ...