Browsing Institutt for datateknologi og informatikk by Title
Now showing items 6756-6775 of 6828
-
What Elevation Makes 2.5D Prints Perceptually Natural?
(Journal article; Peer reviewed, 2022) -
What gamification design do users want in a self-management application for chronic diseases? - The case of Cystic Fibrosis
(Master thesis, 2017)The thesis comprises planning, testing and refining of a co-design workshop for data collection. The workshop was run with two patients diagnosed with CF, resulting in 4 hours of audio and 41 gamification design ideas. The ... -
What Happened to P2P Systems? A Special Focus on Content Distribution Systems
(Master thesis, 2008)Peer-to-Peer (P2P) technology has emerged as a new distributed computing paradigm. P2P technology attempts to "harness the powers of the edges of the Internet" by making efficient and effective use of peers (users) at the ... -
What is large in large-scale? A taxonomy of scale for agile software development
(Journal article; Peer reviewed, 2014)Positive experience of agile development methods in smaller projects has created interest in the applicability of such methods in larger scale projects. However, there is a lack of conceptual clarity regarding what large-scale ... -
What is Missing from Research on Data in Information Systems? Insights from the Inaugural Workshop on Data Research
(Peer reviewed; Journal article, 2023)Data are the building blocks of the ongoing digital revolution, yet there are still many unresolved questions regarding their role in the study of information systems (IS), management, and innovation. As data become ... -
What is needed to make an indoor autonomous robot system valuable?
(Master thesis, 2022)I dette og et innledende prosjekt har vi bygd en autonom servicerobot som kan kartlegge omgivelsene sine og navigere innendørs, et oppgavestyringssystem, og et menneske-robot grensesnitt. Maskinvaren som er brukt er billig ... -
What is needed to make an indoor autonomous robot system valuable?
(Master thesis, 2022)I dette og et innledende prosjekt har vi bygd en autonom servicerobot som kan kartlegge omgivelsene sine og navigere innendørs, et oppgavestyringssystem, og et menneske-robot grensesnitt. Maskinvaren som er brukt er billig ... -
What is optimal timing for trauma team alerts? A retrospective observational study of alert timing effects on the initial management of trauma patients
(Journal article; Peer reviewed, 2012)Background: Trauma teams improve the initial management of trauma patients. Optimal timing of trauma alerts could improve team preparedness and performance while also limiting adverse ripple effects throughout the hospital. ... -
What makes Users Trust Security and Privacy of a Blockchain-Based Supply Chain System?
(Master thesis, 2022)Blokkkjedesystemer har sett økt interesse de siste årene, og flere nye bruksområder, som forsyningskjedesystemer, forskes på. Siden blokkkjeder fortsatt er en ny teknologi med klare begrensninger, har ulike artikler utforsket ... -
What makes Users Trust Security and Privacy of a Blockchain-Based Supply Chain System?
(Master thesis, 2022)Blokkkjedesystemer har sett økt interesse de siste årene, og flere nye bruksområder, som forsyningskjedesystemer, forskes på. Siden blokkkjeder fortsatt er en ny teknologi med klare begrensninger, har ulike artikler utforsket ... -
What Should I Wear Today? An IoT–Based Dress Assistant for the e–Society
(Lecture Notes in Computer Science;, Chapter, 2018)Technology is turning into an augmentation of our memory and an invisible assistant in our daily lives. These issues arise many challenges but also opportunities for researchers, developers and even, final users. In this ... -
When Infrared Small Target Detection Meets Tensor Ring Decomposition: A Multiscale Morphological Framework
(Peer reviewed; Journal article, 2022)Detecting the small targets from a heterogeneous background in an infrared image is a challenging problem, which has received extensive attention. In this article, we propose a method in terms of tensor ring (TR) decomposition ... -
When is the Structural Context Effective?
(Journal article; Peer reviewed, 2013) -
When to Treat Security Risks with Cyber Insurance
(Chapter, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ... -
When to Treat Security Risks with Cyber Insurance
(Journal article; Peer reviewed, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ... -
Where Database Technology Meets Model-Driven Engineering - Rethinking Internal Data Representation in Genus App Platform
(Master thesis, 2016)Research has recently shown a keen interest in database technology for analytical workloads that enables high-performance analysis and on-the-fly aggregation, where the main motivation is Business Intelligence and Business ... -
Where the streets have no name - Experiences in GIR for a developing country
(Chapter, 2013)This paper gives a short overview of a project on Geographic Information Retrieval in developing countries in the form of an experience report based in Honduras. It provides some insights into encountered challenges of ... -
Which Threshold Concepts do Computing Students Encounter while Learning Empirical Research Methods?
(Peer reviewed, 2023-11)A strong foundation in empirical research methods is essential for computing students due to the societal impacts of digital technologies. However, learning empirical research is challenging because of a lack of a ... -
Whiteboard content extraction and enhancement for videoconferencing systems
(Master thesis, 2015)Whiteboards have become essential for teaching, presentations and conferences since they are very flexible tools for spontaneous knowledge sharing. It’s content can be captured by videoconferencing systems in order to ...