• The Data Value Quest: A Holistic Semantic Approach at Bosch 

      Zhou, Baifan; Zheng, Zhuoxun; Zhou, Dongzhuoran; Cheng, Gong; Jimenez-Ruiz, Ernesto; Trung-Kien, Tran; Stepanova, Daria; Gad-Elrab, Mohamed H.; Nikolov, Nikolay; Soylu, Ahmet; Kharlamov, Evgeny (Journal article; Peer reviewed, 2022)
      Modern industry witnesses a fast growth in volume and complexity of heterogeneous manufacturing (big) data [1, 2] thanks to the technological advances of Industry 4.0 [1, 3], including development in perception, communication, ...
    • A Data-Driven Approach for Determining Weights in Global Similarity Functions 

      Jaiswal, Amar Deep; Bach, Kerstin (Peer reviewed; Journal article, 2019)
      This paper presents a method to discover initial global similarity weights while developing a case-based reasoning (CBR) system. The approach is based on multiple feature relevance scoring methods and the relevance of ...
    • Deriving Design Principles for AI-Adaptive Learning Systems: Findings from Interviews with Experts 

      Kabudi, Tumaini; Pappas, Ilias; Olsen, Dag Håkon (Journal article; Peer reviewed, 2022)
    • Designing a Pedagogical Strategy for the Implementation of Educational Technology in Collaborative Learning Environments 

      Talmo, Tord Mjøsund; Støckert, Robin; Begona Gonzalez, Ricart; Sapountzi, Maria; Dafoulas, George; Bekiaridis, George; Valenti, Alessia; Mazaj, Jelena; Tsiakara, Ariadni (Peer reviewed; Journal article, 2023)
      Educational Technology (Ed. Tech) can provide different approaches to our learning designs and engage and motivate students to achieve their academic aims. However, few efforts have been made to use response tools in ...
    • Detection of Running Malware Before it Becomes Malicious 

      Banin, Sergii; Dyrkolbotn, Geir Olav (Peer reviewed; Journal article, 2020)
      As more vulnerabilities are being discovered every year [17], malware constantly evolves forcing improvements and updates of security and malware detection mechanisms. Malware is used directly on the attacked systems, thus ...
    • Digital Competences for Language Teachers: Do Employers Seek the Skills Needed from Language Teachers Today? 

      Talmo, Tord Mjøsund; Soule, Maria Victoria; Fominykh, Mikhail; Giordano, Antonio; Perifanou, Maria; Suckacke, Vilma; Novozhilova, Anna; D'Ambrosio, Roberta; Elçi, Alev (Peer reviewed; Journal article, 2020)
      Language proficiency is essential for 21st Century skills, and for the ability to obtain and utilize new competencies in the future. Digitalization is greatly affecting the language learning settings, and more digital ...
    • The Direction of Updatable Encryption Does Not Matter Much 

      Jiang, Yao (Peer reviewed; Journal article, 2020)
      Updatable encryption schemes allow for key rotation on ciphertexts. A client outsourcing storage of encrypted data to a cloud server can change its encryption key. The cloud server can update the stored ciphertexts to the ...
    • Discrete fourier analysis on lattice grids 

      Nome, Morten Andreas; Sørevik, Tor (Journal article; Peer reviewed, 2019)
      Using group theory we describe the relation between lattice sampling grids and the corresponding non-aliasing Fourier basis sets, valid for all 1-periodic lattices. This technique enable us to extend the results established ...
    • DYNLO: Enhancing Non-linear Regularized State Observer Brain Mapping Technique by Parameter Estimation with Extended Kalman Filter 

      Soler Guevara, Andres Felipe; Giraldo, Eduardo; Molinas Cabrera, Maria Marta (Journal article; Peer reviewed, 2019)
      The underlying activity in the brain can be estimated using methods based on discrete physiological models of the neural activity. These models involve parameters for weighting the estimated source activity of previous ...
    • Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme 

      Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold (Peer reviewed; Journal article, 2021)
      The long term privacy of voting systems is of increasing concern as quantum computers come closer to reality. Everlasting privacy schemes offer the best way to manage these risks at present. While homomorphic tallying ...
    • ePortfolio Introduction: Designing a Support Process 

      Olstad, Hege Annette (Peer reviewed; Journal article, 2020)
      As a result of innovations within the computer field, educational content changes continuously. The constant change can make it challenging for some students to understand what competencies they have gained. Relevant ...
    • Explaining Traffic Situations – Architecture of a Virtual Driving Instructor 

      Sandberg, Martin K. Hoel; Rehm, Johannes; Mnoucek, Matej; Gundersen, Odd Erik; Reshodko, Irina (Peer reviewed; Journal article, 2020)
      Intelligent tutoring systems become more and more common in assisting human learners. Distinct advantages of intelligent tutoring systems are personalized teaching tailored to each student, on-demand availability not ...
    • Exploring the Relationship Between Data Science and Circular Economy: an Enhanced CRISP-DM Process Model 

      Kristoffersen, Eivind; Omotola, Oluseun Aremu; Blomsma, Fenna; Mikalef, Patrick; Li, Jingyue (Journal article; Peer reviewed, 2019)
      To date, data science and analytics have received much attention from organizations seeking to explore how to use their massive volumes of data to create value and accelerate the adoption of Circular Economy (CE) concepts. ...
    • Fast and Secure Updatable Encryption 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Peer reviewed; Journal article, 2020)
      Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update ...
    • Fine-Grained Secure Attribute-Based Encryption 

      Wang, Yuyu; Pan, Jiaxin; Chen, Yu (Peer reviewed; Journal article, 2021)
    • Fostering Learners’ Performance with On-demand Metacognitive Feedback 

      Papamitsiou, Zacharoula; Economides, Anastasios; Giannakos, Michail (Journal article; Peer reviewed, 2019)
      Activating learners’ deeper thinking mechanisms and reflective judgement (i.e., metacognition) improves learning performance. This study exploits visual analytics to promote metacognition and delivers task-related ...
    • From Responsible AI Governance to Competitive Performance: The Mediating Role of Knowledge Management Capabilities 

      Papagiannidis, Emmanouil; Mikalef, Patrick; Krogstie, John; Conboy, Kieran (Journal article; Peer reviewed, 2022)
      In a constantly changing environment, researchers and practitioners are concerned with the issue of whether responsible artificial intelligence (AI) governance can help build competitive advantage. Responsible AI governance ...
    • Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course 

      Tilden, Solveig; Lugo, Ricardo Gregorio; Parish, Karen; Mishra, Deepti; Knox, Benjamin James (Peer reviewed; Journal article, 2021)
      Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ...
    • Gender-Inclusive Design: Case Studies and Guidelines 

      Szlavi, Anna; Guedes, Leandro (Journal article, 2023)
      The importance of inclusivity as a value in our social contexts is increasing; thus, it is not unusual that the software industry has started to embrace it. The need for such a consideration stems from the fact that the ...
    • A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange 

      Pan, Jiaxin; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      We propose a generic construction of password-based authenticated key exchange (PAKE) from key encapsulation mechanisms (KEM). Assuming that the KEM is oneway secure against plaintext-checkable attacks (OW-PCA), we prove ...