• Security Requirements for the Deployment of Services Across Tactical SOA 

      Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2017)
      Service Oriented Architectures (SOA) have been identified as a suitable mediator towards the attainment of the requirements imposed by modern warfare. Earlier studies focused primarily on the strategic domain, or the ...
    • Shape analysis on lie groups and homogeneous spaces 

      Celledoni, Elena; Eidnes, Sølve; Eslitzbichler, Markus; Schmeding, Alexander (Journal article, 2017)
      In this paper we are concerned with the approach to shape analysis based on the so called Square Root Velocity Transform (SRVT). We propose a generalisation of the SRVT from Euclidean spaces to shape spaces of curves on ...
    • A Simultaneous, Multidisciplinary Development and Design Journey – Reflections on Prototyping 

      Gerstenberg, Achim; Sjöman, Heikki; Reime, Thov; Abrahamsson, Pekka Kalevi; Steinert, Martin (Chapter, 2015)
    • Social Preferences in Decision Making Under Cybersecurity Risks and Uncertainties 

      Kianpour, Mazaher; Øverby, Harald; Kowalski, Stewart James; Frantz, Christopher (Peer reviewed; Journal article, 2019)
      The most costly cybersecurity incidents for organizations result from the failures of their third parties. This means that organizations should not only invest in their own protection and cybersecurity measures, but also ...
    • Spatial Statistics of Term Co-occurrences for Location Prediction of Tweets 

      Özdikis, Özer; Ramampiaro, Heri; Nørvåg, Kjetil (Journal article; Peer reviewed, 2018)
      Predicting the locations of non-geotagged tweets is an active research area in geographical information retrieval. In this work, we propose a method to detect term co-occurrences in tweets that exhibit spatial clustering ...
    • Split payments in payment networks 

      Piatkivskyi, Dmytro; Nowostawski, Mariusz (Journal article; Peer reviewed, 2018)
      Traditional blockchain systems, such as Bitcoin, focus on transactions in which entire amount is transferred from one owner to the other, in a single, atomic operation. This model has been re-used in the context of payment ...
    • Strong Authentication for Web services with Mobile Universal Identity 

      Do, Van Thanh; Ivar, Jørstad; Do, Van Thuan (Journal article, 2015)
      To access services on the Web, users need quite often to have accounts, i.e. user names and passwords. This becomes a problem when the number of accounts keeps increasing at the same time password is a very weak form of ...
    • Supporting Utilities for Heterogeneous Embedded Image Processing Platforms (STHEM): An Overview 

      Sadek, Ahmad; Muddukrishna, Ananya; Kalms, Lester; Djupdal, Asbjørn; Podlubne, Ariel; Paolillo, Antonio; Goehringer, Diana; Jahre, Magnus (Journal article; Peer reviewed, 2018)
      The TULIPP project aims to simplify development of embedded vision applications with low-power and real-time requirements by providing a complete image processing system package called the TULIPP Starter Kit. To achieve ...
    • Survival by Deception 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Sørensen, Jan Tore (Journal article; Peer reviewed, 2007)
      A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. ...
    • Synthesizing Components with Sessions from Collaboration-Oriented Service Specifications 

      Kraemer, Frank Alexander; Bræk, Rolv; Herrmann, Peter Michael (Journal article; Peer reviewed, 2007)
      A fundamental problem in the area of service engineering is the so-called cross-cutting nature of services, i.e., that service behavior results from a collaboration of partial component behaviors. We present an approach ...
    • The role of contemporary skills in information technology professionals: An FsQCA approach 

      Giannakos, Michail; Pappas, Ilias; Mikalef, Patrick (Journal article; Peer reviewed, 2017)
      Information Technology (IT) industries’ knowledge and ability to innovate, heavily relies in the skills of the IT professionals. In particular, inefficiencies usually come from the lack of skills or IT professionals’ ...
    • Towards highlight based illuminant estimation in multispectral images 

      Khan, Haris Ahmad; Thomas, Jean-Baptiste; Hardeberg, Jon Yngve (Journal article; Peer reviewed, 2018)
      We review the physics based illuminant estimation methods, which extract information from highlights in images. Such highlights are caused by specular reflection from the surface of dielectric materials, and according to ...
    • Towards new privacy regulations in europe: Users' privacy perception in recommender systems 

      Mohallick, Itishree; De Moor, Katrien; Özgöbek, Özlem; Gulla, Jon Atle (Journal article; Peer reviewed, 2018)
      Despite the fact that recommender systems are becoming increasingly popular in every aspect of the web, users might hesitate to use these personalization-based services in return of their personal information if they believe ...
    • Universal Design Approaches among Norwegian Experts 

      Begnum, Miriam E. Nes (Journal article; Peer reviewed, 2017)
      This study addresses a need for a better understanding of methodological decisions in universal design (UD) of ICT systems. Practices employed by recognized Norwegian professionals on UD of ICT systems are studied through ...
    • Valuable Puzzles for Proofs-of-Work 

      Boyd, Colin Alexander; Carr, Christopher (Journal article; Peer reviewed, 2018)
      Proof-of-work (PoW) is used as the consensus mechanism in most cryptocurrencies. PoW-based puzzles play an important part in the operation and security of a cryptocurrency, but come at a considerable energy cost. One ...
    • Visualizing Cyber Security Risks with Bow-Tie Diagrams 

      Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan (Journal article; Peer reviewed, 2018)
      Safety and security risks are usually analyzed independently, by different people using different tools. Consequently, the system analyst may fail to realize cyber attacks as a contributing factor to safety impacts or, on ...
    • What is large in large-scale? A taxonomy of scale for agile software development 

      Dingsøyr, Torgeir; Fægri, Tor Erlend; Itkonen, Juha (Journal article; Peer reviewed, 2014)
      Positive experience of agile development methods in smaller projects has created interest in the applicability of such methods in larger scale projects. However, there is a lack of conceptual clarity regarding what large-scale ...
    • Women and computer games 

      Jaccheri, Maria Letizia; Wang, Alf Inge; Ask, Kristine; Petersen, Sobah Abbas; Brend, Kristina (Journal article, 2017)
      This full day workshop welcomes contributions that enhance the state of the knowledge about the relation between women and computer games. Women have often been seen as consumers of computer games. The current landscape ...