• Learning Analytics for Learning Design: Towards Evidence-Driven Decisions to Enhance Learning 

      Mangaroska, Katerina; Giannakos, Michail (Journal article; Peer reviewed, 2017)
      As the fields of learning analytics and learning design mature, the convergence and synergies between them become an important area for research. Collecting and combining learning analytics coming from different channels ...
    • Making Complex Ontologies End User Accessible via Ontology Projections 

      Soylu, Ahmet; Kharlamov, Evgeny (Journal article; Peer reviewed, 2018)
      Ontologies are a powerful mechanism to structure domains of interest. They have successfully been applied in medical domain, industry and other important areas. Despite the simplicity of ontological vocabularies that consist ...
    • Malware, Encryption, and Rerandomization - Everything is Under Attack 

      Galteland, Herman; Gjøsteen, Kristian (Journal article; Peer reviewed, 2017)
      A malware author constructing malware wishes to infect a specific location in the network. The author will then infect n initial nodes with n different variations of his malicious code. The malware continues to infect ...
    • Managing private credentials by privacy-preserving biometrics 

      Yang, Bian; Li, Guoqiang (Journal article; Peer reviewed, 2018)
      We investigate in this paper the need to managing a user’s private credentials using privacy-preserving biometrics, define several private credential management work models under different trust models between a user and ...
    • Minimal Free Space Constraints for Implicit Distance Bounds 

      Haugo, Simen; Stahl, Annette (Chapter; Peer reviewed, 2020)
      A general approach for fitting implicit models to sensor data is to optimize an objective function measuring the quality of the fit. The objective function often involves evaluating the model’s implicit function at several ...
    • Mobile-Based Painting Photo Retrieval using Combined Features 

      Companioni-Brito, Claudia; Mariano, Zygred; Elawady, Mohamed; Yildirim Yayilgan, Sule (Journal article; Peer reviewed, 2018)
      In paintings or artworks, sharing a photo of a painting using mobile phone is simple and fast. However, searching for information about specific captured photo of an unknown painting takes time and is not easy. No previous ...
    • Modeling concept drift: A probabilistic graphical model based approach 

      Borchani, Hanen; Martinez, Ana M.; Masegosa, Andres; Langseth, Helge; Nielsen, Thomas D.; Salmeron, Antonio; Fernandez, Antonio; Madsen, Anders L.; Sáez, Ramón (Journal article; Peer reviewed, 2015-11-22)
      An often used approach for detecting and adapting to concept drift when doing classification is to treat the data as i.i.d. and use changes in classification accuracy as an indication of concept drift. In this paper, ...
    • Modelling Similarity for Comparing Physical Activity Profiles - A Data-Driven Approach 

      Verma, Deepika; Bach, Kerstin; Mork, Paul Jarle (Journal article; Peer reviewed, 2018)
      Objective measurements of physical behaviour are an interesting research field from the public health and computer science perspective. While for public health research, measurements with a high quality and feasible setup ...
    • Motivations and emotions in social media: Explaining users' satisfaction with FsQCA 

      Pappas, Ilias; Papavlasopoulou, Sofia; Kourouthanassis, Panos; Mikalef, Patrick; Giannakos, Michail (Journal article; Peer reviewed, 2017)
      This study aims to explain how motivations and emotions combine to influence users’ satisfaction with social media. Motivations are decomposed into four attributes, entertainment, information, social-psychological, and ...
    • Multi-Domain Adapted Machine Translation Using Unsupervised Text Clustering 

      Bungum, Lars; Gambäck, Björn (LNCS;, Chapter, 2015)
      Domain Adaptation in Machine Translation means to take a machine translation system that is restricted to work in a specific context and to enable the system to translate text from a different domain. The paper presents a ...
    • Offline Assisted Group Key Exchange 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Journal article; Peer reviewed, 2018)
      We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, ...
    • On Enhancing Visual Query Building over KGs Using Query Logs 

      Klungre, Vidar Norstein; Soylu, Ahmet; Giese, Martin; Waaler, Arild; Kharlamov, Evgeny (Journal article; Peer reviewed, 2018)
      Knowledge Graphs have recently gained a lot of attention and have been successfully applied in both academia and industry. Since KGs may be very large: they may contain millions of entities and triples relating them to ...
    • One click privacy for online social networks 

      Hehnle, Philipp; Keilbach, Pascal; Lee, Hyun-Jin; Lejn, Sabrina; Steidinger, Daniel; Weinbrenner, Marina; Langweg, Hanno (Journal article; Peer reviewed, 2017)
      We present an approach to reduce the complexity of adjusting privacy preferences for multiple online social networks. To achieve this, we quantify the effect on privacy for choices that users make, and simplify configuration ...
    • Online reviews or marketer information? An eye-tracking study on social commerce consumers 

      Mikalef, Patrick; Sharma, Kshitij; Pappas, Ilias; Giannakos, Michail (Journal article; Peer reviewed, 2017)
      Driven by the increasing popularity of social commerce sites, this study seeks to examine the information sources and formats that influence consumer intentions to purchase. Specifically, we build on uses and gratifications ...
    • Pi-Cipher: Authenticated Encryption for Big Data 

      Gligoroski, Danilo; Mihajloska, Hristina; Samardjiska, Simona; Jacobsen, Håkon; Jensen, Rune Erlend; El-Hadedy, Mohamed (Chapter, 2014)
      In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, ...
    • Practical and tightly-secure digital signatures and authenticated key exchange 

      Gjøsteen, Kristian; Jager, Tibor (Journal article; Peer reviewed, 2018)
      Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrifice efficiency by ...
    • QoE Analysis of the Setup of Different Internet Services for FIFO Server Systems 

      Hoßfeld, Tobias; Varela, Martin; Heegaard, Poul Einar; Skorin-Kapov, Lea (Journal article; Peer reviewed, 2018)
      Queueing systems following a first-in-first-out (FIFO) strategy are well understood and various results are known for the response time of the system. However, the question arises how the results look like when taking into ...
    • Rapid prototyping internet of things applications for augmented objects: The tiles toolkit approach 

      Gianni, Francesco Valerio; Mora, Simone; Divitini, Monica (Journal article; Peer reviewed, 2018)
      Designing and prototyping for IoT have historically required a diverse range of skills and a set of tools that individually supported only a fraction of the whole process, not being designed to work together. These tools ...
    • Saliency-based Image Object Indexing and Retrieval 

      Lam, Yat Hong; Yildirim, Sule (Journal article; Peer reviewed, 2018)
      We suggest a novel approach to combine visual saliency model and object recognition to provide a more semantic description of an image based on human attention priority. The idea is to index and retrieve semantically more ...
    • Security notions for cloud storage and deduplication 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen (Journal article; Peer reviewed, 2018)
      Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required ...