• Can’t You Tell I am a Human? A Comparison of Common Text and Image CAPTCHAs Using a Low-Fidelity Methodology 

      Eriksen, Hannah Marie Maurstad; Hoel, Lars; Jetteberg, Caroline Sofie; Leiknes, Amalie Christine; Sandnes, Frode Eika (Chapter; Conference object, 2023)
      Many websites employ CAPTCHAs to limit web robot traffic. Al- though CAPTCHA challenges may improve security they come at the cost of reduced usability and accessibility. This study set out to explore users’ performance ...
    • CHALLENGING THE AUDITORIUM. HOW TO FLIP A CLASSROOM IN A ROOM THAT CANNOT BE FLIPPED? 

      Hagerup, Nina; Giannoumis, G. Anthony; Haakonsen, Peter; Øyan, Petter (Chapter; Peer reviewed, 2017)
      For many students, the auditorium is the room that most embodies Higher Education. However, recent studies and developments in teaching methodologies in higher education, such as blended learning and the flipped ...
    • Citizen participation and ICT for urban development in Oslo 

      Giannoumis, G. Anthony; Joneja, Nidhi (Chapter; Peer reviewed, 2022)
      Information and communications technologies provide a useful catalyst for promoting political participation in urban development. However, implicit biases often influence the design of those technologies, which can reinforce ...
    • Co-Creatives Spaces: The machine as a collaborator 

      Thelle, Notto Johannes Windju; Wærstad, Bernt Isak Grave (Chapter, 2023)
      People have always used new technology to experiment with new forms of music creation. However, the latest devel- opments in artificial intelligence (AI) suggest that machines are on the verge of becoming more than mere ...
    • A Comparison of Form Navigation with Tabbing and Pointing 

      Ferner, Bernt; Gåsøy, Adrian; Nicolaysen, Martin Walberg; Sandnes, Frode Eika (Lecture Notes in Computer Science;, Chapter; Peer reviewed; Conference object; Journal article, 2023)
      The form is a widely used metaphor in information gathering. Users typically navigate between form elements using a keyboard or a pointing device. This study set out to empirically compare tabbing and pointing in form ...
    • A computer supported memory aid for copying prescription parameters into medical equipment based on linguistic phrases 

      Sandnes, Frode Eika; Huang, Yo-Ping (Proceedings of System, Man and Cybernetics Conference SMC;2013, Chapter; Peer reviewed, 2013)
      Manually operated medical equipment, including drug infusion pumps, are often subject to input errors. Human operators copy data from a prescription into the relevant form field on the equipment panels. This process is ...
    • The Concept of Workload Delay as a Quality-of-Service Metric for Consolidated Cloud Environments with Deadline Requirements 

      Tasoulas, Evangelos; Hammer, Hugo Lewi; Haugerud, Hårek; Yazidi, Anis; Bratterud, Alfred; Feng, Boning (Chapter; Peer reviewed, 2017)
      Virtual Machine (VM) consolidation in the cloud has received significant research interest. A large body of approaches for VM consolidation in data centers resort to variants of the bin packing problem which tries to ...
    • A contrast colour selection scheme for WCAG2.0-compliant web designs based on HSV-half-planes 

      Sandnes, Frode Eika; Zhao, Anqi (Chapter, 2015)
      Abstract—Sufficient colour contrast between text and background is necessary for the text to be readable. WCAG2.0 defines contrast guidelines that ensure web pages can be read by people with a visual acuity of as low as ...
    • ContrastNER: Contrastive-based Prompt Tuning for Few-shot NER 

      Layegh, Amirhossein; Hossein Payberah, Amir; Soylu, Ahmet; Roman, Dumitru; Matskin, Mihhail (IEEE Annual International Computer Software and Applications Conference (COMPSAC);, Chapter; Peer reviewed; Conference object, 2023)
      Prompt-based language models have produced encouraging results in numerous applications, including Named Entity Recognition (NER) tasks. NER aims to identify entities in a sentence and provide their types. However, the ...
    • Cross-federation identities for IoT devices in cellular networks 

      Santos, Bernardo; Dzogovic, Bruno; Feng, Boning; Do, Thuan Van; Jacot, Niels; Do, van Thanh (Chapter; Peer reviewed, 2019)
      With the upcoming deployment and usage of Cellular Internet of Things solutions, it is important to mitigate some issues regarding security, due to the physical limitations that some devices have such as low memory, low ...
    • Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm 

      Rauniyar, Ashish; Engelstad, Paal E.; Feng, Boning; Do, van Thanh (Chapter; Peer reviewed; Chapter, 2016)
      In internet of things (IoT) paradigm, crowdsourcing is the process of obtaining and analyzing information or input to a particular task or project generated by a number of sources such as sensors, mobile devices, vehicles ...
    • Cultivating a Universal Design Mindset in Young Students 

      Tatara, Naoe; Giannoumis, G. Anthony (Chapter; Peer reviewed, 2017)
      Universal Design (UD) is an approach to promoting an inclusive society with equity as a central focus. With trends in globalization and population aging , it is critical to cultivate a UD-oriented ...
    • Data center traffic scheduling with hot-cold link detection capabilities 

      Yazidi, Anis; Hussein, Abdi; Feng, Boning (RACS '18 Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems;, Chapter; Chapter; Peer reviewed, 2018)
      Software-Defined Networking (SDN) has been one of the most discussed areas in computer networking over the last years. The field has raised an extensive amount of research, and led to a transformation of traditional network ...
    • Data fusion without knowledge of the ground truth using Tseltin-like Automata 

      Yazidi, Anis; Sandnes, Frode Eika (Chapter; Peer reviewed; Chapter, 2016)
      The fusioning of data from unreliable sensors has received much research attention. The main stream of research assesses the reliability of a sensor by comparing its readings to the ground ...
    • Deployment Models: Towards Eliminating Security Concerns From Cloud Computing 

      Zhao, Gansen; Chunming, Rong; Jaatun, Martin Gilje; Sandnes, Frode Eika (Chapter; Peer reviewed, 2010-08)
      Cloud computing has become a popular choice as an alternative to investing new IT systems. When making decisions on adopting cloud computing related solutions, security has always been a major concern. This article summarizes ...
    • Design competence in ICT education 

      Gulden, Tore; Sandnes, Frode Eika; Habib, Laurence (Chapter, 2012)
      The new discrimination law in Norway requires new product s and environments to be developed in such a way that they can be used by as many people as possible. In response to this legisl ation the applied ...
    • Designing and developing a web application of food products focusing on plant-based diets for better health 

      Bong, Way Kiat; Yousaf, Abubakar; Li, Yuan Jing; Chen, Weiqin (Chapter, 2022)
      Abstract. Plant-based food products are getting more popular in the market as they are claimed to be healthier and more sustainable to the environment. However, there is a lack of platform where consumers can easily obtain ...
    • Detecting Threats of Violence in Online Discussions Using Bigrams of Important Words 

      Hammer, Hugo Lewi (IEEE Joint;, Chapter; Peer reviewed, 2014)
      Making violent threats towards minorities like immigrants or homosexuals is increasingly common on the Internet. We present a method to automatically detect threats of violence using machine learning. A material of ...
    • Detection of micro contamination in hard disk drives using maximum likelihood estimation and angle detection 

      Ieamsaard, Jirarat; Muneesawang, Paisarn; Sandnes, Frode Eika (Chapter; Peer reviewed; Chapter, 2016)
      Micro contamination is one of the critical defects that occur on the head gimbal assembly (HGA). The HGA is a key component of the read/write assembly of a hard disk drive. This paper presents an image-based automatic ...
    • Déjà vu - Predicting the number of players in online games through normalization of historical data 

      Tyvand, Jon-Erik; Begnum, Kyrre; Hammer, Hugo Lewi (Chapter; Peer reviewed, 2011)
      A key factor to delivering a good online gaming experience is to have sufficient server resources relative to the number of players online. In this work, we present a simple profiling technique which allows effective ...