• Definitions for Plaintext-Existence Hiding in Cloud Storage 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen (ARES 2018;Article No. 41, Chapter, 2018)
      Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client side, leaking information ...
    • Delay and delay-constrained throughput analysis of a wireless powered communication system 

      Li, Zhidu; Jiang, Yuming; Gao, Yuehong; Sang, Lin; Yang, Dacheng (Journal article, 2017)
      In this paper, we investigate the delay and delay-constrained throughput performance of a point-to-point wireless-powered communication system, where one node, e.g. a user equipment (UE), is powered by the wireless energy ...
    • Delay and Delay-Constrained Throughput Performance of a Wireless-Powered Communication System 

      Li, Zhidu; Jiang, Yuming; Gao, Yuehong; Li, Pengxiang; Sang, Lin; Yang, Dacheng (Journal article; Peer reviewed, 2017)
      In this paper, the delay and delay-constrained throughput performance of a point-to-point wireless-powered communication system is investigated. In this system, the wireless-powered node, e.g., a user equipment (UE), ...
    • Delay Discounting and its Impact on Information Security Decision-Making 

      Søgnen, Marte Marjorie (Master thesis, 2023)
      Påvirkningen informasjonsteknologi har på organisasjoner er i stadig vekst. Digitalisering har ført til nye forretningsmuligheter og effektivitet. Imidlertid følger det med disse fremskrittene stadig skiftende risikoer som ...
    • Delay-Resistant Geo-Distributed Analytics 

      Mostafaei, Habib; Smaragdakis, Georgios; Zinner, Thomas Erich; Feldmann, Anja (Peer reviewed; Journal article, 2022)
      Big data analytics platforms have played a critical role in the unprecedented success of data-driven applications. However, real-time and streaming data applications, and recent legislation, e.g., GDPR in Europe, have posed ...
    • Demand-Side Economies of Scope in Big Tech Business Modelling and Strategy 

      Henten, Anders; Windekilde, Iwona Maria (Peer reviewed; Journal article, 2022)
      The purpose of the paper is to discuss the issue of economies of scope in platform research and to attract attention to the importance of scope economies for the strength and growth of Big Tech corporations. Hitherto, most ...
    • Demand-Side Economies of Scope in Big Tech Business Modelling and Strategy 

      Windekilde, Iwona Maria; Henten, Anders (Peer reviewed; Journal article, 2022)
      The purpose of the paper is to discuss the issue of economies of scope in platform research and to attract attention to the importance of scope economies for the strength and growth of Big Tech corporations. Hitherto, most ...
    • Demanding services and applications in optical packet networks 

      Molla, Dereje Mechal (Master thesis, 2013)
      A wide range of advanced services and applications are being developed day by day. And it?s quite attractive to identify the requirements of these services and applications in terms of QoS performance needs such as bandwidth ...
    • Democratizing Interactive Music Production over the Internet 

      Engum, Trond; Wittner, Otto Jonassen (Journal article; Peer reviewed, 2018)
      This paper describes an ongoing research project which address challenges and opportunities when collaborating interactively in real time in a ”virtual” sound studio with several partners in different locations. ”Virtual” ...
    • Demonstrating QoE-aware 5G Network Slicing Emulated with HTB in OMNeT++ 

      Gajic, Marija; Bosk, Marcin; Schwarzmann, Susanna; Lange, Stanislav; Zinner, Thomas Erich (Chapter, 2022)
      Today’s networks support a great variety of services with different bandwidth and latency requirements. To maintain high user satisfaction and efficient resource utilization, providers employ traffic shaping. One such ...
    • Denial-of-service attack resilience of the GSM access network. 

      Suraev, Maxim (Master thesis, 2011)
      GSM network capable of connecting to any operator providing SIP trunk has beenconstructed to serve as a target for controlled experiment on DoS attacks againstGSM. The usage of this network as a tool to perform DoS attack ...
    • Dependability Analysis of Smart Distribution Grid Architectures Considering Various Failure Modes 

      Zerihun, Tesfaye Amare; Helvik, Bjarne Emil (Chapter, 2018)
      The future smart distribution grid will be consisting of new components and technologies with enhanced capability whose failure behaviour can not be determined with certainty. In studying the reliability of these distribution ...
    • Dependability Differentiation in Cloud Services 

      Chilwan, Ameen (Master thesis, 2011)
      As cloud computing is becoming more mature and pervasive, almost all types of services are being deployed in clouds. This has also widened the spectrum of cloud users which encompasses from domestic users to large companies. ...
    • Dependability differentiation in communication networks 

      Mykkeltveit, Anders (Doctoral Theses at NTNU, 1503-8181; 2008:312, Doctoral thesis, 2008)
      Unintentional failures affect links and nodes in communication networks. Recovery mechanisms are the key tool for achieving the dependability required by the services using the network. However, high dependability in ...
    • Dependability in Interdependent Digital Ecosystems 

      Hettervik, Martin Hagen (Master thesis, 2015)
      Advances in information and communications technology (ICT) encourages the interconnection of ICT systems with traditional monolithic systems, creating complex systems of systems. A modern variety of such systems is the ...
    • Dependability Modeling, Analysis, and Provisioning of NFV-Supported Services 

      Tola, Besmir (Doctoral theses at NTNU;2021:248, Doctoral thesis, 2021)
    • Dependability modelling of Jgroup/ARM 

      Sæstad, Ane (Master thesis, 2008)
      In the later years, fault tolerant distributed systems have been applied to a variety of network internal and external services. Keeping distributed systems consistent and fault tolerant require management functionality. ...
    • Dependability of the NFV Orchestrator: State of the Art and Research Challenges 

      Gonzalez, Andres Javier; Nencioni, Gianfranco; Kamisinski, Andrzej; Helvik, Bjarne Emil; Heegaard, Poul Einar (Journal article; Peer reviewed, 2018)
      The introduction of network function virtualisation (NFV) represents a significant change in networking technology, which may create new opportunities in terms of cost efficiency, operations, and service provisioning. ...
    • Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain 

      Mendis, Handunneththi V. Kalpanie; Balapuwaduge, Indika A.M.; Li, Frank Yong (Peer reviewed; Journal article, 2019)
      Ultra-reliable low latency communication (URLLC), which refers to achieving almost 100% reliability at a certain (satisfactory) level of services and stringent latency, is one of the key requirements for 5G networks. ...
    • Dependence Control in Wireless Communication 

      Sun, Fengyou (Doctoral theses at NTNU;2020:10, Doctoral thesis, 2020)
      In the physical world, the system components or the system states are probabilistically related to each other spatially and temporally. This kind of relation is termed stochastic dependence or dependence, which is described ...