Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1776-1795 av 2536
-
Protocols for toll road systems
(Master thesis, 2013)A problem in a tolling system like AutoPASS is the number of unidentified passages due to unreadable license plates. As a consequence money is lost for the toll road companies. A scheme is proposed that uses anonymous ... -
Providing a Birds Eye View on the Execution of Distributed, Reactive Systems using Collaborations
(Master thesis, 2006)This thesis studies the use of collaborations as a mean to visualize behaviour of an observed distributed reactiv system. The work is inspired by previous work where an approach using elementary collaborations, that is ... -
PS-DeVCEM: Pathology-sensitive deep learning model for video capsule endoscopy based on weakly labeled data
(Peer reviewed; Journal article, 2020)We propose a novel pathology-sensitive deep learning model (PS-DeVCEM) for frame-level anomaly detection and multi-label classification of different colon diseases in video capsule endoscopy (VCE) data. Our proposed model ... -
Pseudonymiseringsteknologi i nasjonale helseregistre
(Master thesis, 2007)I Norge, finnes det i dag en rekke helseregistre. Blant disse er det per i dag bare to pseudonyme helseregistre. Det vil si registre som ikke er avidentifiserte, anonyme eller personidentifiserende. De er personentydige. ... -
Public Key Cryptography for 5G Private Identification
(Master thesis, 2020)Den neste generasjonen mobilnett blir kalt 5G. 5G introduserer flere forbedringer i forhold til den forrige generasjonen, kjent som Long Term Evolution (LTE). Noen av disse forbedringene gjelder personvernet til abonnentene. ... -
Public Key Infrastructure in Cooperative Intelligent Transport Systems
(Master thesis, 2018)Cooperative Intelligent Transport Systems (C-ITS) enable vehicles and infrastructure to exchange information and provide users with an enhanced situation overview. It can provide early warning in potentially dangerous ... -
Public safety networks towards mission critical mobile broadband networks
(Master thesis, 2016)Lack of broadband data applications in dedicated public safety networks has pushed public safety users to seek for the solutions in commercial LTE networks. However, LTE communication systems are missing functionalities ... -
QoE - Defining a User-Centric Concept for Service Quality
(Chapter, 2016) -
QoE Analysis of the Setup of Different Internet Services for FIFO Server Systems
(Journal article; Peer reviewed, 2018)Queueing systems following a first-in-first-out (FIFO) strategy are well understood and various results are known for the response time of the system. However, the question arises how the results look like when taking into ... -
QoE Beyond the MOS: An In-Depth Look at QoE via Better Metrics and their Relation to MOS
(Journal article; Peer reviewed, 2016)While Quality of Experience (QoE) has advanced very significantly as a field in recent years, the methods used for analyzing it have not always kept pace. When QoE is studied, measured or estimated, practically all the ... -
QoE of in-car multimedia use in \newline Traditional and Autonomous Cars
(Master thesis, 2022)Da COVID-19 pandemien inntraff, ble alle brått anbefalt å kjøre bil til jobb fremfor å bruke kollektiv transport som lenge har vært anbefalt tilkomstmetode på grunn av de negative klimaeffektene til bilkjøring. Dette ... -
QoS performance of LTE networks with network coding
(Master thesis, 2015)Nowadays the widespread use of variety of smart phones and tablets with wide range of multimedia application support is driving more data service users towards full mobility causing a rapid increase in demand for mobile ... -
QoS-Aware Inter-Domain Connectivity: Control Plane Design and Operational Considerations
(Chapter, 2022)Scenarios related to 5G and beyond give rise to a high degree of heterogeneity in terms of applications, services, and user expectations as well as more demanding QoS requirements with an end-to-end scope that can cover ... -
Quality and Traffic Flow in Videoconferencing Infrastructures
(Bachelor thesis, 2021)Målet med denne bacheloroppgaven har vært å gi innsikt i de to platformene Microsoft Teams og Cisco Webex. For å oppnå målet har forskjellige typer virituelle møter blitt kjørt og analysert. De virtuelle møtene er forskjellige ... -
Quality Assessment of Video Services in the Long Term
(Chapter, 2023)In traditional subjective video quality experiments, the presented sequences are short and quality ratings are based on a single interaction with a service (i.e., one session). However, in real-life scenarios, users interact ... -
Quality evaluation in spectral imaging – Quality factors and metrics
(Journal article, 2014)Spectral imaging has many advantages over conventional three channel colour imaging, and has numerous applications in many domains. Despite many benefits, applications, and different techniques being proposed, little ... -
Quality of Experience of WebRTC based video communication
(Master thesis, 2016)Online video applications are growing in popularity and using an increasing share of the consumer Internet traffic. Web Real-Time Communication (WebRTC) is a new technology which allows browser-to-browser communications ... -
Quantifying data volatility for IoT forensics with examples from Contiki OS
(Journal article; Peer reviewed, 2022)Forensic investigations are often conducted under limited resource availability such as time, equipment, and people. As data acquisition is resource-demanding already, a higher emphasis needs to be put on prioritizing the ... -
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
(Journal article; Peer reviewed, 2023)Due to the high adoption of cloud services, the protection of data and information is critical. Cloud service customers (CSCs) need help to obtain the authoritative assurances required for the cloud services and negotiate ... -
Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security
(Chapter, 2016)Achieving the quantitative risk assessment has long been an elusive problem in information security, where the subjective and qualitative assessments dominate. This paper discusses the appropriateness of statistical and ...