• U-Compare bio-event meta-service: compatible BioNLP event extraction services 

      Kano, Yoshinobu; Björne, Jari; Ginter, Filip; Salakoski, Tapio; Buyko, Ekaterina; Hahn, Udo; Cohen, Kevin Bretonnel; Verspoor, Karin; Roeder, Christophe; Hunter, Lawrence E.; Kilicoglu, Halil; Bergler, Sabine; Van Landeghem, Sofie; Van Parys, Thomas; Van de Peer, Yves; Miwa, Makoto; Ananiadou, Sophia; Neves, Mariana; Pascual-Montano, Alberto; Ozgur, Arzucan; Radev, Dragomir R.; Riedel, Sebastian; Sætre, Rune; Chun, Hong-Woo; Kim, Jin-Dong; Pyysalo, Sampo; Ohta, Tomoko; Tsujii, Jun'ichi (Journal article; Peer reviewed, 2011)
      Background: Bio-molecular event extraction from literature is recognized as an important task of bio text mining and, as such, many relevant systems have been developed and made available during the last decade. While ...
    • UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things 

      Liu, Yalin; Dai, Hong-Ning; Wang, Hao; Imran, Muhammad; Wang, Xiaofeng; Shoaib, Muhammad (Peer reviewed; Journal article, 2020)
      Low power Internet of Things (IoT) is suffering from two limitations: battery-power limitation of IoT nodes and inflexibility of infrastructure-node deployment. In this paper, we propose an Unmanned Aerial Vehicle (UAV)-enabled ...
    • UAV-enabled friendly jamming scheme to secure industrial Internet of Things 

      Wang, Qubeijian; Dai, Hong-Ning; Wang, Hao; Xu, Guangquan; Sangaiahs, Arun Kumar (Journal article; Peer reviewed, 2019)
      Eavesdropping is a critical threat to the security of industrial Internet of things (IIoT) since many malicious attacks often follow eavesdropping activities. In this paper, we present an anti-eavesdropping scheme based ...
    • UbiBazaar: App Store for the Internet of Things 

      Stastny, Simon (Master thesis, 2015)
      Recently the world witnesses the emergence of Internet of Things (IoT) technologies, as new commercial IoT products by both large tech companies and new startups are coming to market daily. The recent boom in hardware ...
    • UbiCollab: A Service Architecture for Supporting Ubiquitous Collaboration 

      Brustad, Andreas Larsen; Mosveen, Christian Hågensen (Master thesis, 2006)
      Ubiquitous computing integrates computation into the environment, and enables users to move around and interact with computers more naturally than they currently do. This helps to address some of the traditional challenges ...
    • UbiFall: a study of fall detection services and use of social media 

      Lund, Andreas (Master thesis, 2013)
      En studie av eksisterende falldeteksjon-servicer og systemer, samt planlegging, utvikling, implementasjon og evaluering av et nytt system i samarbeid med SINTEF.
    • Ubiquitous Computing at Point of Care in Hospitals: A User-Centered Approach 

      Dahl, Yngve (Doktoravhandlinger ved NTNU, 1503-8181; 2007:147, Doctoral thesis, 2007)
      Ubiquitous computing opens up for a wide range of ways to support human-computer interaction beyond the desktop, and promises more seamless integration between computer technology and situations of use. However, the ...
    • Ultrasound Guided Surgery: Multimodal Visualization and Navigation Accuracy 

      Lindseth, Frank (Dr. ingeniøravhandling, 0809-103X; 2002:143, Doctoral thesis, 2003)
      The overall goal of this study was to develop new and improved techniques in the field of ultrasound-guided minimal invasive surgery that could be implemented in future navigation systems based on ultrasound. The focus has ...
    • Unconventional Biometrics 

      Barbosa, Igor Barros (Doctoral theses at NTNU;2020:262, Doctoral thesis, 2020)
      This thesis is a paper collection that focuses on unconventional methods of biometric recognition. Four new approaches are presented and discussed. The first two introduce and explore the concepts behind transient biometrics. ...
    • Understanding and Improving Recurrent Networks for Human Activity Recognition by Continuous Attention 

      Zeng, Ming; Gao, Haoxiang; Yu, Tong; Mengshoel, Ole Jakob; Langseth, Helge; Lane, Ian; Liu, Xiaobing (Chapter, 2018)
      Deep neural networks, including recurrent networks, have been successfully applied to human activity recognition. Unfortunately, the final representation learned by recurrent networks might encode some noise (irrelevant ...
    • Understanding and Visualizing Filters in Deep Convolutional Neural Network Architectures 

      Aunrønning, Ola (Master thesis, 2018)
      Deep neural networks are black boxes. While we know how they learn, we still don t have a great understanding of what they learn. This project has a goal of visualizing and understanding what convolutional neural networks ...
    • Understanding Awareness Support in Home Care Technology 

      Filberg, Jon Martin (Master thesis, 2017)
      An aging population is one of the reasons why institutionalized care services are struggling to meet the demands. As a result, demands are met through extended focus on home care services, which in turn have stimulated the ...
    • Understanding challenges in municipal greenhouse gas emission inventories 

      Ahlers, Dirk; Driscoll, Patrick (Conference object, 2016)
      A necessary prerequisite for impactful climate mitigation action is the availability of suitable and reliable baselines of emissions. This is especially true for urban and citylevel actions and strategies that need reliable ...
    • Understanding Challenges of Applying Enterprise Architecture in Public Sectors: A Technology Acceptance Perspective 

      Guo, Hong; Li, Jingyue; Gao, Shang (Chapter, 2019)
      Enterprise Architecture (EA) as a popular approach, has been used in city governments and public sectors to improve consistency among their business goals and ICT implementations. Despite theoretical benefits that have ...
    • Understanding challenges to adoption of the Microsoft Elevation of Privilege game 

      Tøndel, Inger Anne; Oyetoyan, Tosin Daniel; Jaatun, Martin Gilje; Cruzes, Daniela Soares (Chapter, 2018)
      The goal of secure software engineering is to create software that keeps performing as intended even when exposed to an active attacker. Threat modelling is considered to be a key activity, but can be challenging to perform ...
    • Understanding Challenges to Adoption of the Protection Poker Software Security Game 

      Tøndel, Inger Anne; Jaatun, Martin Gilje; Cruzes, Daniela Soares; Oyetoyan, Tosin Daniel (Chapter, 2019)
      Currently, security requirements are often neglected in agile projects. Despite many approaches to agile security requirements engineering in literature, there is little empirical research available on why there is limited ...
    • Understanding coding activities for teens: a focus on school teachers' perspectives 

      Quayyum, Farzana; Bueie, Jonas; Torrado Vidal, Juan Carlos; Jaccheri, Maria Letizia (Chapter, 2020)
      Over the last few years, researchers, teachers, parents, volunteers, and even IT companies have joined efforts to develop coding activities for children in K-12 education. These efforts include technological tools and ...
    • Understanding Organizations’ Adoption of AI Technologies: Challenges, Opportunities and Impact 

      Holmsen, Theodor L. (Master thesis, 2021)
      Der hvor mange publiserte verk og forskningsbidrag har lett for å bli påvirket av diverse eksterne krefter, vil en masteroppgave fra NTNU ha fordelen av å representere et akademisk forankret produkt. Denne oppgaven utforsker ...
    • Understanding Selective Delay as a Method for Efficient Secure Speculative Execution 

      Sakalis, Christos; Kaxiras, Stefanos; Ros, Alberto; Jimborean, Alexandra; Själander, Magnus (Peer reviewed; Journal article, 2020)
      Since the introduction of Meltdown and Spectre, the research community has been tirelessly working on speculative side-channel attacks and on how to shield computer systems from them. To ensure that a system is protected ...