• When to Treat Security Risks with Cyber Insurance 

      Meland, Per Håkon; Seehusen, Fredrik (Chapter, 2018)
      Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ...
    • When to Treat Security Risks with Cyber Insurance 

      Meland, Per Håkon; Seehusen, Fredrik (Journal article; Peer reviewed, 2018)
      Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ...
    • Where Database Technology Meets Model-Driven Engineering - Rethinking Internal Data Representation in Genus App Platform 

      Åmdal, Håkon (Master thesis, 2016)
      Research has recently shown a keen interest in database technology for analytical workloads that enables high-performance analysis and on-the-fly aggregation, where the main motivation is Business Intelligence and Business ...
    • Where Schön and Simon agree: The rationality of design 

      Schaathun, Hans Georg (Peer reviewed; Journal article, 2022)
      Simon and Schön are commonly seen to represent two conflicting views on design method, but this interpretation has been challenged in recent years. In this paper we discuss their differences and agreements in more depth. ...
    • Where the streets have no name - Experiences in GIR for a developing country 

      Ahlers, Dirk (Chapter, 2013)
      This paper gives a short overview of a project on Geographic Information Retrieval in developing countries in the form of an experience report based in Honduras. It provides some insights into encountered challenges of ...
    • Which Threshold Concepts do Computing Students Encounter while Learning Empirical Research Methods? 

      Hussain, Syed Sajid; Moalagh, Morteza; Farshchian, Babak A. (Peer reviewed; Conference object, 2023-11)
      A strong foundation in empirical research methods is essential for computing students due to the societal impacts of digital technologies. However, learning empirical research is challenging because of a lack of a ...
    • White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019 

      Assenza, Giacomo; Cozzani, Valerio; Flammini, Francesco; Gotcheva, Nadezhda; Gustafsson, Tommy; Hansson, Anders; Heikkilä, Jouko; Iaiani, Matteo; Katsikas, Sokratis; Nissilä, Minna; Oliva, Gabriele; Richter, Eleni; Roelofs, Maaike; Saman Azari, Mehdi; Setola, Roberto; Stejin, Wouter; Tugnoli, Alessandro; Vanderbeek, Dolf; Westerdahl, Lars; Ylönen, Marja; Young, Heather (Chapter, 2019)
      The security of critical infrastructures is of paramount importance nowadays due to the growing complexity of components and applications. This paper collects the contributions to the industry dissemination session within ...
    • Whiteboard content extraction and enhancement for videoconferencing systems 

      Duque, Carlos Andrés Arango (Master thesis, 2015)
      Whiteboards have become essential for teaching, presentations and conferences since they are very flexible tools for spontaneous knowledge sharing. It’s content can be captured by videoconferencing systems in order to ...
    • Whitehead memorial lecture: Challenging defects of high voltage insulation systems 

      Ildstad, Erling (Peer reviewed; Journal article, 2020)
      The primary function of a high voltage insulation system is to prevent the flow of electric current between oppositely charged conductors, facilitate heat transportation and provide mechanical support throughout a long ...
    • Who Will Be the Leaders in Top Academic Positions in Entertainment Computing? 

      Jaccheri, Maria Letizia; Khodambashi, Soudabeh; De Moor, Katrien; Özgöbek, Özlem; Kralevska, Katina (Chapter, 2018)
      To address the issue of under-represented women in Entertainment Computing (EC), this paper builds on a set of theoretical references and ongoing projects to propose a set of guidelines that can be used to set up projects ...
    • Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-level 

      Wang, Zhuowei; Xiong, Naixue; Wang, Hao; Cheng, Lianglun; Zhao, Wuqing (Journal article; Peer reviewed, 2018)
      Power consumption reduction is the primary problem for the design and implementation of heterogeneous parallel systems. As it is difficult to make progress in the low-power optimization in the hardware layer to meet the ...
    • Whole Team Thinking and Success Factors in Large Scale Agile Development - An Exploratory Case Study 

      Syversen, Tina Christin (Master thesis, 2016)
      Agile software development has been the preferred method since it was introduced as a software development method in 2001. It was originally intended for small co-located teams but in later years it has experienced widespread ...
    • Whole-Body Motion Planning and Collision Avoidance for AIAUV 

      Husebø, Peter Hatlebrekke (Master thesis, 2022)
      Leddede, autonome undervannsroboter (AIAUVer) baner vei for økt optimalisering av varierte marine operasjoner og er spesielt egnet for operasjoner i områder med begrenset fremkommelighet. For å løse ulike operasjoner på ...
    • Whole-genome sequencing analysis of the cardiometabolic proteome 

      Gilly, Arthur; Park, Young-Chen; Png, Grace; Barysenka, Andrei; Fischer, Iris; Bjørnland, Thea; Southam, Lorraine; Suveges, Daniel; Neumeyer, Sonja; Rayner, William; Tsafantakis, Emmanouil; Karaleftheri, Maria; Dedoussis, George; Zeggini, Eleftheria (Journal article; Peer reviewed, 2020)
      The human proteome is a crucial intermediate between complex diseases and their genetic and environmental components, and an important source of drug development targets and biomarkers. Here, we comprehensively assess the ...
    • Why are neural networks vulnerable to adversarial examples? 

      Mundal, Halvor (Master thesis, 2020)
      Nevrale nettverk har det siste tiåret vist seg å ha utmerket ytelse i et bredt spekter av oppgaver, og kan til og med utkonkurrere mennesker på enkelte områder. Imidlertid har de også vist seg å være sårbare for små, ...
    • Why developing country Nepal should use social media in public offices? 

      Khatri, Bodh Bahadur (Master thesis, 2017)
      Now a day s usefulness of Social Media can be seen in every sphere of the people s life. Peoples are using social media to communicate with each other, to get entertainment, to create, share and exchange information s, ...
    • Why intraperitoneal glucose sensing is sometimes surprisingly rapid and sometimes slow: A hypothesis 

      Åm, Marte Kierulf; Fougner, Anders Lyngvi; Ellingsen, Reinold; Hjelme, Dag Roar; Bösch, Patrick Christian; Stavdahl, Øyvind; Carlsen, Sven Magnus; Christiansen, Sverre (Journal article; Peer reviewed, 2019)
      The artificial pancreas requires fast and reliable glucose measurements. The peritoneal space has shown promising results, and in one of our studies we detected glucose changes in the peritoneal space already at the same ...
    • Why securing smart grids is not just a straightforward consultancy exercise 

      Line, Maria Bartnes (Journal article; Peer reviewed, 2014)
      The long-term vision for modernization of power management and control systems, Smart Grid, is rather complex. It comprises several scientific traditions; SCADA and automation systems, information and communication technology, ...
    • The Why, What, and How of Immersive Experience 

      Zhang, Chenyan (Journal article; Peer reviewed, 2020)
    • Wi-Fi based Telecommunication Infrastructure Delivered as a Service by UAV for Emergency Response 

      Zolich, Artur Piotr; Fonseca Palma, David; Birkeland, Roger; Cisek, Krzysztof Piotr; Johansen, Tor Arne (Chapter, 2022)
      In this paper we discuss Wi-Fi and complementary technologies that can be used to mitigate telecommunication gaps in search and rescue (SAR) activities and during natural disaster (ND) response scenarios. We present and ...