• What Should I Wear Today? An IoT–Based Dress Assistant for the e–Society 

      Gomez Escribano, Javier (Lecture Notes in Computer Science;, Chapter, 2018)
      Technology is turning into an augmentation of our memory and an invisible assistant in our daily lives. These issues arise many challenges but also opportunities for researchers, developers and even, final users. In this ...
    • Wheel Slip Control in ABS Brakes using Gain Scheduled Optimal Control with Constraints 

      Petersen, Idar (Dr. ingeniøravhandling, 0809-103X; 2003:43, Doctoral thesis, 2003)
      In a conventional antilock brake system (ABS), the wheel slip will oscillate around a "critical slip" within some given thresholds. This oscillation will have as side effects a noticeable vibration for the driver and ...
    • When Infrared Small Target Detection Meets Tensor Ring Decomposition: A Multiscale Morphological Framework 

      Deng, Lizhen; Song, Jie; Xu, Guoxia; Zhu, Hu (Peer reviewed; Journal article, 2022)
      Detecting the small targets from a heterogeneous background in an infrared image is a challenging problem, which has received extensive attention. In this article, we propose a method in terms of tensor ring (TR) decomposition ...
    • When is gray-box modeling advantageous for virtual flow metering? 

      Hotvedt, Mathilde; Grimstad, Bjarne André; Ljungquist, Dag; Imsland, Lars Struen (Peer reviewed; Journal article, 2022)
      Integration of physics and machine learning in virtual flow metering applications is known as gray-box modeling. The combination is believed to enhance multiphase flow rate predictions. However, the superiority of gray-box ...
    • When is the Structural Context Effective? 

      Norozi, Muhammad Ali; Arvola, Paavo (Journal article; Peer reviewed, 2013)
    • When to Treat Security Risks with Cyber Insurance 

      Meland, Per Håkon; Seehusen, Fredrik (Chapter, 2018)
      Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ...
    • When to Treat Security Risks with Cyber Insurance 

      Meland, Per Håkon; Seehusen, Fredrik (Journal article; Peer reviewed, 2018)
      Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ...
    • Where Database Technology Meets Model-Driven Engineering - Rethinking Internal Data Representation in Genus App Platform 

      Åmdal, Håkon (Master thesis, 2016)
      Research has recently shown a keen interest in database technology for analytical workloads that enables high-performance analysis and on-the-fly aggregation, where the main motivation is Business Intelligence and Business ...
    • Where Schön and Simon agree: The rationality of design 

      Schaathun, Hans Georg (Peer reviewed; Journal article, 2022)
      Simon and Schön are commonly seen to represent two conflicting views on design method, but this interpretation has been challenged in recent years. In this paper we discuss their differences and agreements in more depth. ...
    • Where the streets have no name - Experiences in GIR for a developing country 

      Ahlers, Dirk (Chapter, 2013)
      This paper gives a short overview of a project on Geographic Information Retrieval in developing countries in the form of an experience report based in Honduras. It provides some insights into encountered challenges of ...
    • Which Threshold Concepts do Computing Students Encounter while Learning Empirical Research Methods? 

      Hussain, Syed Sajid; Moalagh, Morteza; Farshchian, Babak A. (Peer reviewed; Conference object, 2023-11)
      A strong foundation in empirical research methods is essential for computing students due to the societal impacts of digital technologies. However, learning empirical research is challenging because of a lack of a ...
    • White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019 

      Assenza, Giacomo; Cozzani, Valerio; Flammini, Francesco; Gotcheva, Nadezhda; Gustafsson, Tommy; Hansson, Anders; Heikkilä, Jouko; Iaiani, Matteo; Katsikas, Sokratis; Nissilä, Minna; Oliva, Gabriele; Richter, Eleni; Roelofs, Maaike; Saman Azari, Mehdi; Setola, Roberto; Stejin, Wouter; Tugnoli, Alessandro; Vanderbeek, Dolf; Westerdahl, Lars; Ylönen, Marja; Young, Heather (Chapter, 2019)
      The security of critical infrastructures is of paramount importance nowadays due to the growing complexity of components and applications. This paper collects the contributions to the industry dissemination session within ...
    • Whiteboard content extraction and enhancement for videoconferencing systems 

      Duque, Carlos Andrés Arango (Master thesis, 2015)
      Whiteboards have become essential for teaching, presentations and conferences since they are very flexible tools for spontaneous knowledge sharing. It’s content can be captured by videoconferencing systems in order to ...
    • Whitehead memorial lecture: Challenging defects of high voltage insulation systems 

      Ildstad, Erling (Peer reviewed; Journal article, 2020)
      The primary function of a high voltage insulation system is to prevent the flow of electric current between oppositely charged conductors, facilitate heat transportation and provide mechanical support throughout a long ...
    • Who Will Be the Leaders in Top Academic Positions in Entertainment Computing? 

      Jaccheri, Maria Letizia; Khodambashi, Soudabeh; De Moor, Katrien; Özgöbek, Özlem; Kralevska, Katina (Chapter, 2018)
      To address the issue of under-represented women in Entertainment Computing (EC), this paper builds on a set of theoretical references and ongoing projects to propose a set of guidelines that can be used to set up projects ...
    • Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-level 

      Wang, Zhuowei; Xiong, Naixue; Wang, Hao; Cheng, Lianglun; Zhao, Wuqing (Journal article; Peer reviewed, 2018)
      Power consumption reduction is the primary problem for the design and implementation of heterogeneous parallel systems. As it is difficult to make progress in the low-power optimization in the hardware layer to meet the ...
    • Whole Team Thinking and Success Factors in Large Scale Agile Development - An Exploratory Case Study 

      Syversen, Tina Christin (Master thesis, 2016)
      Agile software development has been the preferred method since it was introduced as a software development method in 2001. It was originally intended for small co-located teams but in later years it has experienced widespread ...
    • Whole-Body Motion Planning and Collision Avoidance for AIAUV 

      Husebø, Peter Hatlebrekke (Master thesis, 2022)
      Leddede, autonome undervannsroboter (AIAUVer) baner vei for økt optimalisering av varierte marine operasjoner og er spesielt egnet for operasjoner i områder med begrenset fremkommelighet. For å løse ulike operasjoner på ...
    • Whole-genome sequencing analysis of the cardiometabolic proteome 

      Gilly, Arthur; Park, Young-Chen; Png, Grace; Barysenka, Andrei; Fischer, Iris; Bjørnland, Thea; Southam, Lorraine; Suveges, Daniel; Neumeyer, Sonja; Rayner, William; Tsafantakis, Emmanouil; Karaleftheri, Maria; Dedoussis, George; Zeggini, Eleftheria (Journal article; Peer reviewed, 2020)
      The human proteome is a crucial intermediate between complex diseases and their genetic and environmental components, and an important source of drug development targets and biomarkers. Here, we comprehensively assess the ...
    • Why are neural networks vulnerable to adversarial examples? 

      Mundal, Halvor (Master thesis, 2020)
      Nevrale nettverk har det siste tiåret vist seg å ha utmerket ytelse i et bredt spekter av oppgaver, og kan til og med utkonkurrere mennesker på enkelte områder. Imidlertid har de også vist seg å være sårbare for små, ...