Browsing Fakultet for informasjonsteknologi og elektroteknikk (IE) by Title
Now showing items 20166-20185 of 20337
-
What is Missing from Research on Data in Information Systems? Insights from the Inaugural Workshop on Data Research
(Peer reviewed; Journal article, 2023)Data are the building blocks of the ongoing digital revolution, yet there are still many unresolved questions regarding their role in the study of information systems (IS), management, and innovation. As data become ... -
What is needed to make an indoor autonomous robot system valuable?
(Master thesis, 2022)I dette og et innledende prosjekt har vi bygd en autonom servicerobot som kan kartlegge omgivelsene sine og navigere innendørs, et oppgavestyringssystem, og et menneske-robot grensesnitt. Maskinvaren som er brukt er billig ... -
What is needed to make an indoor autonomous robot system valuable?
(Master thesis, 2022)I dette og et innledende prosjekt har vi bygd en autonom servicerobot som kan kartlegge omgivelsene sine og navigere innendørs, et oppgavestyringssystem, og et menneske-robot grensesnitt. Maskinvaren som er brukt er billig ... -
What is optimal timing for trauma team alerts? A retrospective observational study of alert timing effects on the initial management of trauma patients
(Journal article; Peer reviewed, 2012)Background: Trauma teams improve the initial management of trauma patients. Optimal timing of trauma alerts could improve team preparedness and performance while also limiting adverse ripple effects throughout the hospital. ... -
What makes Users Trust Security and Privacy of a Blockchain-Based Supply Chain System?
(Master thesis, 2022)Blokkkjedesystemer har sett økt interesse de siste årene, og flere nye bruksområder, som forsyningskjedesystemer, forskes på. Siden blokkkjeder fortsatt er en ny teknologi med klare begrensninger, har ulike artikler utforsket ... -
What makes Users Trust Security and Privacy of a Blockchain-Based Supply Chain System?
(Master thesis, 2022)Blokkkjedesystemer har sett økt interesse de siste årene, og flere nye bruksområder, som forsyningskjedesystemer, forskes på. Siden blokkkjeder fortsatt er en ny teknologi med klare begrensninger, har ulike artikler utforsket ... -
What Should I Wear Today? An IoT–Based Dress Assistant for the e–Society
(Lecture Notes in Computer Science;, Chapter, 2018)Technology is turning into an augmentation of our memory and an invisible assistant in our daily lives. These issues arise many challenges but also opportunities for researchers, developers and even, final users. In this ... -
Wheel Slip Control in ABS Brakes using Gain Scheduled Optimal Control with Constraints
(Dr. ingeniøravhandling, 0809-103X; 2003:43, Doctoral thesis, 2003)In a conventional antilock brake system (ABS), the wheel slip will oscillate around a "critical slip" within some given thresholds. This oscillation will have as side effects a noticeable vibration for the driver and ... -
When Infrared Small Target Detection Meets Tensor Ring Decomposition: A Multiscale Morphological Framework
(Peer reviewed; Journal article, 2022)Detecting the small targets from a heterogeneous background in an infrared image is a challenging problem, which has received extensive attention. In this article, we propose a method in terms of tensor ring (TR) decomposition ... -
When is gray-box modeling advantageous for virtual flow metering?
(Peer reviewed; Journal article, 2022)Integration of physics and machine learning in virtual flow metering applications is known as gray-box modeling. The combination is believed to enhance multiphase flow rate predictions. However, the superiority of gray-box ... -
When is the Structural Context Effective?
(Journal article; Peer reviewed, 2013) -
When to Treat Security Risks with Cyber Insurance
(Chapter, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ... -
When to Treat Security Risks with Cyber Insurance
(Journal article; Peer reviewed, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ... -
Where Database Technology Meets Model-Driven Engineering - Rethinking Internal Data Representation in Genus App Platform
(Master thesis, 2016)Research has recently shown a keen interest in database technology for analytical workloads that enables high-performance analysis and on-the-fly aggregation, where the main motivation is Business Intelligence and Business ... -
Where Schön and Simon agree: The rationality of design
(Peer reviewed; Journal article, 2022)Simon and Schön are commonly seen to represent two conflicting views on design method, but this interpretation has been challenged in recent years. In this paper we discuss their differences and agreements in more depth. ... -
Where the streets have no name - Experiences in GIR for a developing country
(Chapter, 2013)This paper gives a short overview of a project on Geographic Information Retrieval in developing countries in the form of an experience report based in Honduras. It provides some insights into encountered challenges of ... -
Which Threshold Concepts do Computing Students Encounter while Learning Empirical Research Methods?
(Peer reviewed; Conference object, 2023-11)A strong foundation in empirical research methods is essential for computing students due to the societal impacts of digital technologies. However, learning empirical research is challenging because of a lack of a ... -
White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019
(Chapter, 2019)The security of critical infrastructures is of paramount importance nowadays due to the growing complexity of components and applications. This paper collects the contributions to the industry dissemination session within ... -
Whiteboard content extraction and enhancement for videoconferencing systems
(Master thesis, 2015)Whiteboards have become essential for teaching, presentations and conferences since they are very flexible tools for spontaneous knowledge sharing. It’s content can be captured by videoconferencing systems in order to ... -
Whitehead memorial lecture: Challenging defects of high voltage insulation systems
(Peer reviewed; Journal article, 2020)The primary function of a high voltage insulation system is to prevent the flow of electric current between oppositely charged conductors, facilitate heat transportation and provide mechanical support throughout a long ...