• Secure Implementation of a RISC-V AES Accelerator 

      Waage, Aleksander (Master thesis, 2022)
      Teknologi har blitt en viktig del av hverdagen, og det forventes at det er sikkert å bruke det. Sikkerhet er dermed en kritisk faktor i hvert steg under utviklingen. Konfidensiell informasjon blir ofte skjult ved bruk av ...
    • Securing Next Generation Multinodal Leadless Cardiac Pacemaker System: A Proof of Concept in a Single Animal 

      Awan, Muhammad Faheem; Cordero, Rafael; Kansanen, Kimmo; Feuerstein, Delphine (Peer reviewed; Journal article, 2020)
      As the next generation of implanted medical devices for cardiac rhythm management moves towards multi-nodal leadless systems that do without the limitations of transvenous leads, new security threats arise from the wireless ...
    • Securing the Distributed Kalman Filter Against Curious Agents 

      Moradi, Ashkan; Dasanadoddi Venkategowda, Naveen Kumar; Talebi, Sayedpouria; Werner, Stefan (Chapter, 2021)
      Distributed filtering techniques have emerged as the dominant and most prolific class of filters used in modern monitoring and surveillance applications, such as smart grids. As these techniques rely on information sharing ...
    • Security concerns on machine learning solutions for 6G networks in mmWave beam prediction 

      Catak, Ferhat Özgur; Kuzlu, Murat; Catak, Evren; Cali, Umit; Unal, Devrim (Peer reviewed; Journal article, 2022)
      6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ...
    • Security in Offline Web Applications 

      Svartberg, Anja (Master thesis, 2009)
      Offline Web applications are increasingly popular. The possibility to have both the advantages of Web applications and traditional desktop applications is exiting. An offline Web application can be accessed from all ...
    • Security of QKD-systems with detector efficiency mismatch 

      Lydersen, Lars Vincent van De Wiel (Master thesis, 2008)
      The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is called quantum key distribution (QKD). In theory the key exchange can be made completely secure. Real QKD implementations ...
    • Security of quantum key distribution source 

      Simonsen, Eivind Sjøtun (Master thesis, 2010)
      Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses, which may be exploited in the future, either by development in mathematics, or by quantum ...
    • Security of quantum key distribution with bit and basis dependent detector flaws 

      Lydersen, Lars; Skaar, Johannes (Journal article; Peer reviewed, 2010)
      We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), in the presence of bit and basis dependent detector flaws. We suggest a powerful attack that can be used in systems ...
    • Segmentation and labelling of speech 

      Kvale, Knut (Dr. ingeniøravhandling, 0809-103X; 1993:126, Doctoral thesis, 1993)
      During the last decades, significant research efforts have been aimed at devoloping speech technology products such as speech input and output systems. In order to train and evaluate these systems huge speech databases ...
    • Seismic airgun sound propagation in shallow water of the East Siberian shelf and its prediction with the measured source signature 

      Han, Dong-Gyan; Kim, Sookwan; Landrø, Martin; son, Wuju; Lee, Dae Hyeok; Choi, Yeonjin; Jin, Young Keun; Hong, Jong Kuk; Kang, Sung-Ho; Rhee, Tae Siek; Shin, Hyoung Chul; La, Hyoung Sul (Peer reviewed; Journal article, 2023)
      Seismic airgun sound was measured with an autonomous passive acoustic recorder as a function of distance from 18.6 to 164.2 km in shallow water (<70 m) at the continental shelf of the East Siberian Sea in September 2019. ...
    • Seismic wave modelling on GPU clusters 

      Pedersen, Anders Solberg (Master thesis, 2019)
      Vi utvikler et program for å simulere seismiske bølger på GPU-klynger ved hjelp av CUDA og MPI. Ved å bruke spektralelementmetoden til å løse den elastiske bølgelikningen i 3D kan problemet paralleliseres og løses effektivt. ...
    • Seismisk inversjon ved bruk av genetiske algoritmer 

      Helland, Fredrik (Master thesis, 2006)
      Det er ønskelig med nøyaktig informasjon om fysiske egenskaper som beskriver havbunnen for å kunne modellere akustisk utbredelse i vannet. Det har i denne oppgaven blitt sett på global inversjon av geoakustiske parametere. ...
    • Selective area growth of AlGaN nanopyramid arrays on graphene by metal-organic vapor phase epitaxy 

      Munshi, A Mazid; Kim, Dong-Chul; Heimdal, Carl Philip J; Heilmann, Martin; Christiansen, Silke; Vullum, Per Erik; Van Helvoort, Antonius; Weman, Helge (Journal article; Peer reviewed, 2018)
      Wide-bandgap group III-nitride semiconductors are of special interest for applications in ultraviolet light emitting diodes, photodetectors, and lasers. However, epitaxial growth of high-quality III-nitride semiconductors ...
    • Selective Charging Behavior in an Ionic Mixture Electrolyte- Supercapacitor System for Higher Energy and Power 

      Wang, Xuehang; Mehandzhiyski, Aleksandar Yordanov; Arstad, Bjørnar; Van Aken, Katherine L.; Tyler S., Mathis; Gallegos, Alejandro; Tian, Ziqi; Ren, Dingding; Sheridan, Edel; Grimes, Brian Arthur; Jiang, De-en; Wu, Jianzhong; Gogotsi, Yury; Chen, De (Journal article; Peer reviewed, 2017)
      Ion–ion interactions in supercapacitor (SC) electrolytes are considered to have significant influence over the charging process and therefore the overall performance of the SC system. Current strategies used to weaken ionic ...
    • Selective State Retention Power-Gating based on Complete Property Checking 

      Plasencia Balabarca, Frank Pedro (Master thesis, 2021)
    • Self Reconfiguration of Clock Networks on FPGA: Methodology for partial reconfiguration of synchronous modules at run-time 

      Hansen, Sindre (Master thesis, 2011)
      In this thesis, methodology for partial self-reconfiguration of synchronous modules has been developed. A simple software-based scheduler has been built for scheduling synchronous modules on the FPGA. The motivation behind ...
    • Self-cloning state machines on FPGA 

      Blomkvist, Daniel H (Master thesis, 2013)
      The purpose of this thesis is to continue development of a single state rep-resentation for use in a Self-Cloning State Machine. The Self-Cloning StateMachine can be used to represent Non-Deterministic Finite State Machines ...
    • Self-Organizing Networks (SON): TD-ICIC Implementation In a Network Simulator 

      Christiansen, Thomas F. (Master thesis, 2014)
      Co-channel interference is becoming a real headache for operators when deploying HetNets but a solution presents itself in the form of inter-cell interference coordination (ICIC). One form of ICIC is called almost blank ...
    • Self-supervised Underwater Source Localization based on Contrastive Predictive Coding 

      Zhu, Xiaoyu; Dong, Hefeng; Salvo Rossi, Pierluigi; Landrø, Martin (Peer reviewed; Journal article, 2021)
      This work introduces a two-step self-supervised learning scheme, namely contrastive predictive coding (CPC), for underwater source localization. In the first step, a CPC-based self-supervised feature extractor is trained ...
    • Self-supervised vision-based detection of the active speaker as support for socially aware language acquisition 

      Stefanov, Kalin; Beskow, Jonas; Salvi, Giampiero (Peer reviewed; Journal article, 2020)
      This paper presents a self-supervised method for visual detection of the active speaker in a multiperson spoken interaction scenario. Active speaker detection is a fundamental prerequisite for any artificial cognitive ...