Blar i Institutt for datateknologi og informatikk på tittel
Viser treff 6494-6513 av 6556
-
What is optimal timing for trauma team alerts? A retrospective observational study of alert timing effects on the initial management of trauma patients
(Journal article; Peer reviewed, 2012)Background: Trauma teams improve the initial management of trauma patients. Optimal timing of trauma alerts could improve team preparedness and performance while also limiting adverse ripple effects throughout the hospital. ... -
What makes Users Trust Security and Privacy of a Blockchain-Based Supply Chain System?
(Master thesis, 2022)Blokkkjedesystemer har sett økt interesse de siste årene, og flere nye bruksområder, som forsyningskjedesystemer, forskes på. Siden blokkkjeder fortsatt er en ny teknologi med klare begrensninger, har ulike artikler utforsket ... -
What makes Users Trust Security and Privacy of a Blockchain-Based Supply Chain System?
(Master thesis, 2022)Blokkkjedesystemer har sett økt interesse de siste årene, og flere nye bruksområder, som forsyningskjedesystemer, forskes på. Siden blokkkjeder fortsatt er en ny teknologi med klare begrensninger, har ulike artikler utforsket ... -
What Should I Wear Today? An IoT–Based Dress Assistant for the e–Society
(Lecture Notes in Computer Science;, Chapter, 2018)Technology is turning into an augmentation of our memory and an invisible assistant in our daily lives. These issues arise many challenges but also opportunities for researchers, developers and even, final users. In this ... -
When Infrared Small Target Detection Meets Tensor Ring Decomposition: A Multiscale Morphological Framework
(Peer reviewed; Journal article, 2022)Detecting the small targets from a heterogeneous background in an infrared image is a challenging problem, which has received extensive attention. In this article, we propose a method in terms of tensor ring (TR) decomposition ... -
When is the Structural Context Effective?
(Journal article; Peer reviewed, 2013) -
When to Treat Security Risks with Cyber Insurance
(Chapter, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ... -
When to Treat Security Risks with Cyber Insurance
(Journal article; Peer reviewed, 2018)Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for ... -
Where Database Technology Meets Model-Driven Engineering - Rethinking Internal Data Representation in Genus App Platform
(Master thesis, 2016)Research has recently shown a keen interest in database technology for analytical workloads that enables high-performance analysis and on-the-fly aggregation, where the main motivation is Business Intelligence and Business ... -
Where the streets have no name - Experiences in GIR for a developing country
(Chapter, 2013)This paper gives a short overview of a project on Geographic Information Retrieval in developing countries in the form of an experience report based in Honduras. It provides some insights into encountered challenges of ... -
Which Threshold Concepts do Computing Students Encounter while Learning Empirical Research Methods?
(Peer reviewed; Conference object, 2023-11)A strong foundation in empirical research methods is essential for computing students due to the societal impacts of digital technologies. However, learning empirical research is challenging because of a lack of a ... -
Whiteboard content extraction and enhancement for videoconferencing systems
(Master thesis, 2015)Whiteboards have become essential for teaching, presentations and conferences since they are very flexible tools for spontaneous knowledge sharing. It’s content can be captured by videoconferencing systems in order to ... -
Who Will Be the Leaders in Top Academic Positions in Entertainment Computing?
(Chapter, 2018)To address the issue of under-represented women in Entertainment Computing (EC), this paper builds on a set of theoretical references and ongoing projects to propose a set of guidelines that can be used to set up projects ... -
Whole Team Thinking and Success Factors in Large Scale Agile Development - An Exploratory Case Study
(Master thesis, 2016)Agile software development has been the preferred method since it was introduced as a software development method in 2001. It was originally intended for small co-located teams but in later years it has experienced widespread ... -
Why are neural networks vulnerable to adversarial examples?
(Master thesis, 2020)Nevrale nettverk har det siste tiåret vist seg å ha utmerket ytelse i et bredt spekter av oppgaver, og kan til og med utkonkurrere mennesker på enkelte områder. Imidlertid har de også vist seg å være sårbare for små, ... -
Why developing country Nepal should use social media in public offices?
(Master thesis, 2017)Now a day s usefulness of Social Media can be seen in every sphere of the people s life. Peoples are using social media to communicate with each other, to get entertainment, to create, share and exchange information s, ... -
Wide-Attention and Deep-Composite Model for Traffic Flow Prediction in Transportation Cyber-Physical Systems
(Peer reviewed; Journal article, 2020)Recently, traffic flow prediction has drawn significant attention because it is a prerequisite in intelligent transportation management in urban informatics. The massively-available traffic data collected from various ... -
WiGiG som aksessteknologi - et supplement til fiberinfrastruktur?
(Bachelor thesis, 2019)Hensikten med denne oppgaven er å vurdere anvendeligheten av WiGiG som aksessteknologi. Oppgaven beskriver og evaluerer resultater knyttet til et pilotprosjekt Lyse har gjennomført i et boligfelt i Sandnes. Ved å samle inn ... -
Wiki i skolen
(Master thesis, 2010)Prosjektet gikk ut på å sette opp Wiki-programvare for en ungdomsskole, og undersøke hvordan elever brukte denne, samt sammenligne bruken mot kjente sosiale nettverk som Wikipedia. Et av forskningsspørsmålene var hvorvidt ... -
Wind Farm Layout Optimization using Population Distributed Genetic Algorithms
(Master thesis, 2016)Wind turbine technology is a promising source of renewable energy. However, the potential of wind turbine technology can not be utilized unless the wind farm layout is efficient. The challenge with wind farm layout ...