• Defining the initial case-base for a CBR operator support system in digital finishing - A methodological knowledge acquisition approach 

      Wienhofen, Leendert Wilhelmus Marinus; Mathisen, Bjørn Magnus (Journal article; Peer reviewed, 2016)
      Case-based reasoning (CBR) literature defines the process of defining a case-base as a hard and time-demanding task though the same literature does not report in detail on how to build your initial case base. The main ...
    • Describing Component Collaboration Using Goal Sequences 

      Carrez, Cyril; Floch, Jacqueline; Sanders, Richard (Journal article; Peer reviewed, 2008)
      Services are normally not performed by a single component, but result from the collaboration of several distributed components. Their precise specification and validation require complex models, where the intention of the ...
    • Determining consumer engagement in word-of-mouth: Trust and network ties in a social commerce setting 

      Mikalef, Patrick; Pappas, Ilias; Giannakos, Michail; Sharma, Kshitij (Journal article; Peer reviewed, 2017)
      Prompted by the popularity of social commerce in the past few years, this study seeks to examine how online reviews influence consumer’s tendency to engage in word-of-mouth (WOM). We investigate how different aspects ...
    • Diagnosing Highly-Parallel OpenMP Programs with Aggregated Grain Graphs 

      Reissmann, Nico; Muddukrishna, Ananya (Journal article; Peer reviewed, 2018)
      Grain graphs simplify OpenMP performance analysis by visualizing performance problems from a fork-join perspective that is familiar to programmers. However, when programmers decide to expose a high amount of parallelism ...
    • Digital art application development: A project to increase motivation in systems development courses for bachelor students in computer engineering 

      Karlsen, Anniken Th; Bye, Robin Trulssen (Journal article; Peer reviewed, 2015)
      In this demonstration, we present some in-progress results of using digital art application development as an example of entertainment computing for increasing motivation and participation in a computer engineering ...
    • Easy 4G/LTE IMSI Catchers for Non-Programmers 

      Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. ...
    • Editorial Image Retrieval using Handcrafted and CNN Features 

      Brito, Claudia Companioni; Elawady, Mohamed; Yildirim, Sule; Hardeberg, Jon Yngve (Journal article; Peer reviewed, 2018)
      Textual keywords have been used in the early stages for image retrieval systems. Due to the huge increase of image content, an image is efficiently used instead according to the time computation. Deciding powerful feature ...
    • Enhancing Usage Control for Performance: An Architecture for Systems of Systems 

      Gkioulos, Vasileios; Rizos, Athanasios; Michailidou, Christina; Mori, Paolo; Saracino, Andrea (Journal article; Peer reviewed, 2019)
      The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ...
    • Evidence for Programming Strategies in University Coding Exercises 

      Sharma, Kshitij; Mangaroska, Katerina; Trætteberg, Hallvard; Lee-Cultura, Serena; Giannakos, Michail (Journal article; Peer reviewed, 2018)
      Success in coding exercises is deeply related to the strategy employed by the students to solve coding tasks. In this contribution, we analyze the programming assignments of 600 students from an introductory university ...
    • Exploring Methods and Guidelines for Child-Computer Interaction Research with Refugee Children 

      Tahir, Rabail; Wang, Alf Inge (Journal article; Peer reviewed, 2019)
      There exist many guidelines and methods on how to do Child-Computer Interaction (CCI) research, but very few focusing specifically on refugee children with a challenging background. The complex situations and multiple ...
    • Extending OMPT to Support Grain Graphs 

      Langdal, Peder Voldnes; Jahre, Magnus; Muddukrishna, Ananya (Journal article, 2017)
      The upcoming profiling API standard OMPT can describe almost all profiling events required to construct grain graphs, a recent visualization that simplifies OpenMP performance analysis. We propose OMPT extensions that ...
    • False-Positive Reduction in Ontology Matching Based on Concepts’ Domain Similarity 

      Vennesland, Audun; Aalberg, Trond (Journal article; Peer reviewed, 2018)
      In this study we explore if considering the domain similarity between concepts to be matched can contribute filter out false positive relations. This is particularly relevant in areas where the “universe of discourse” ...
    • GIF Image Retrieval in Cloud Computing Environment 

      Reyes, Evelyn Lissete Paiz; de Lima, Nadile Nunes; Yildirim, Sule (Journal article; Peer reviewed, 2018)
      GIF images have been used in the last years, especially on social media. Here it is explored a content-based image retrieval system to work specifically with GIF file format. Its implementation is extended to a cloud ...
    • Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces 

      Johnsen, Jan William; Franke, Katrin (Journal article; Peer reviewed, 2018)
      Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service ...
    • Improving the Performance of Pipelined Query Processing with Skipping 

      Jonassen, Simon; Bratsberg, Svein Erik (Journal article; Peer reviewed, 2012)
      Web search engines need to provide high throughput and short query latency. Recent results show that pipelined query processing over a term-wise partitioned inverted index may have superior throughput. However, the query ...
    • Ink bleed-through removal of historical manuscripts based on hyperspectral imaging 

      Rocha, Cristian da Costa; Deborah, Hilda; Hardeberg, Jon Yngve (Journal article; Peer reviewed, 2018)
      Old manuscripts can be degraded by different reasons over time. The ink bleed-through from the back side of the page is a common problem which compromises the readability and the aesthetics of the document. Unsupervised ...
    • Interactive displays for the next generation of entity-centric bibliographic models 

      Aalberg, Trond; Mercun, Tanja; Zumer, Maja (Journal article; Peer reviewed, 2017)
      The model of bibliographic entities defined in the IFLA Functional Requirements for Bibliographic Records (FRBR) represents a major transition from the digital card catalog to databases containing a rich structure of ...
    • Interactive displays for the next generation of entity-centric bibliographic models 

      Aalberg, Trond; Mercun, Tanja; Zumer, Maja (Journal article; Peer reviewed, 2017)
      The model of bibliographic entities defined in the IFLA Functional Requirements for Bibliographic Records (FRBR) represents a major transition from the digital card catalog to databases containing a rich structure of ...
    • Iterative Closest Point with Minimal Free Space Constraints 

      Haugo, Simen; Stahl, Annette (Chapter; Peer reviewed, 2020)
      The Iterative Closest Point (ICP) method is widely used for fitting geometric models to sensor data. By formulating the problem as a minimization of distances evaluated at observed surface points, the method is computationally ...
    • Key recovery: Inert and public 

      Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas (Journal article; Peer reviewed, 2017)
      We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and ...