• DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction 

      Lee, Ming-Chang; Lin, Jia-Chun (Chapter, 2020)
      Over the past decade, several approaches have been introduced for short-term traffic prediction. However, providing fine-grained traffic prediction for large-scale transportation networks where numerous detectors are ...
    • Dashboard for Quality of Experience Studies of WebRTC Based Video Communication 

      Melhoos, Marianne Rie (Master thesis, 2016)
      WebRTC-based applications and services have become more and more popular over the last years. These types of applications support Real-Time Communication (RTC) with audio, video and sometimes also data sharing. WebRTC-based ...
    • Data Access Interface for Innovation on Earth-observation Data 

      Moldestad, Øyvind Y (Master thesis, 2016)
      European Union (EU) adopted an open data policy for the Sentinel constellation of the Copernicus program in 2013. The Copernicus program is now about to transition into its operational phase, which means that it is from ...
    • Data Anonymization for Research 

      Ødegård, Petter (Master thesis, 2019)
      Implementeringen av GDPR får bedrifter til å revurdere deres måte å lagre brukerdata. Forskere trenger realistiske data for å kunne oppnå best mulige resultater. Selv med strenge regler fra GDPR mot å dele og lagre personlig ...
    • Data Dissemination for Vehicles in Temporary Cellular Network Dead Spots 

      Puka, Ergys; Herrmann, Peter (Journal article, 2019)
      The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ...
    • Data Visualization for Discovery of Digital Evidence in Email 

      Nordbø, André (Master thesis, 2014)
      Digital recordings of our activities are constantly being stored and processed in information systems, and are increasingly getting more valuable for investigating illegal activities. A problem we are facing today is the ...
    • Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review 

      Yeng, Prosper; Nweke, Livinus Obiora; Woldaregay, Ashenafi Zebene; Yang, Bian; Snekkenes, Einar Arthur (Peer reviewed; Journal article, 2020)
      Data breaches in healthcare continue to grow exponentially, calling for a rethinking into better approaches of security measures towards mitigating the menace. Traditional approaches including technological measures, have ...
    • Data-driven Approach to Information Sharing using Data Fusion and Machine Learning 

      Andersen, Lars Christian (Master thesis, 2016-08-31)
      The number of security incidents worldwide is increasing, and the capabilities to detect and react is of uttermost importance. Intrusion Detection Systems (IDSs) are employed in various locations in networks to identify ...
    • Data-driven Intrusion Detection System for Small and Medium Enterprises 

      Elezaj, Ogerta; Yildirim Yayilgan, Sule; Abomhara, Mohamed Ali Saleh; Yeng, Prosper; Ahmed, Javed (Journal article; Peer reviewed, 2019)
      Small and Medium Enterprises (SMEs) have become targets of attack by cyber criminals in resent times. This paper therefore aim to address awareness and challenges of SMEs related to IDSs as the most important defense tool ...
    • Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow 

      Lee, Yen-Ting; Pengying, Thitinun; Yildirim Yayilgan, Sule; Elezaj, Ogerta (Chapter, 2021)
      Human action recognition is a very challenging problem due to numerous variations in each body part. In this paper, we propose a method for extracting optical flow information from skeleton data to address the problem of ...
    • Data-driven Machine Learning Model in District Heating System for Heat Load Prediction: A Comparison Study 

      Dalipi, Fisnik; Yildirim, Sule; Gebremedhin, Alemayehu (Journal article; Peer reviewed, 2016)
      We present our data-driven supervised machine-learning (ML) model to predict heat load for buildings in a district heating system (DHS). Even though ML has been used as an approach to heat load prediction in literature, ...
    • Databases fit for blockchain technology: A complete overview 

      Kalajdjieski, Jovan; Raikwar, Mayank; Arsov, Nino; Velinov, Goran; Gligoroski, Danilo (Journal article; Peer reviewed, 2022)
      Efficient data storage and query processing systems play a vital role in many different research areas. Blockchain technology and distributed ledgers attract massive attention and trigger multiple projects in various ...
    • Datakriminalitet i Norge: de mørke tallene 

      Andersson, Line Sunnarvik (Master thesis, 2007)
      NORSK: Bruken av Internett har ført til en globalisering av datakriminalitet. I økende grad er det ressurssterke organiserte miljøer som står bak de alvorligste sakene. Dagens teknologi gjør det mulig å gjennomføre ...
    • Datalagringsdirektivet 

      Leren, Eystein Huse (Master thesis, 2009)
      Datalagringsdirektivet EU 2006/24/EF har til hensikt å harmonisere lovgivningen som gjelder lagring av trafikkdata gjennom hele EU området, og gjennom dette gjøre medlemslandene bedre rustet til å bekjempe alvorlig ...
    • The Dawn of the Human-Machine Era: A forecast of new and emerging language technologies 

      Sayers, Dave; Sousa-Silva, Rui; Höhn, Sviatlana; Ahmedi, Lule; Allkivi-Metsoja, Kais; Anastasiou, Dimitra; Beňuš, Štefan; Bowker, Lynne; Bytyçi, Eliot; Catala, Alejandro; Çepani, Anila; Chacón-Beltrán, Rubén; Dadi, Sami; Dalipi, Fisnik; Despotovic, Vladimir; Doczekalska, Agnieszka; Drude, Sebastian; Fort, Karën; Fuchs, Robert; Galinski, Christian; Gobbo, Federico; Gungor, Tunga; Guo, Siwen; Höckner, Klaus; Láncos, PetraLea; Libal, Tomer; Jantunen, Tommi; Jones, Dewi; Klimova, Blanka; Korkmaz, EminErkan; Maučec, Mirjam Sepesy; Melo, Miguel; Meunier, Fanny; Migge, Bettina; Mititelu, Verginica Barbu; Névéol, Aurélie; Rossi, Arianna; Pareja-Lora, Antonio; Sanchez-Stockhammer, C.; Şahin, Aysel; Soltan, Angela; Soria, Claudia; Shaikh, Sarang; Turchi, Marco; Yildirim Yayilgan, Sule; Bessa, Maximino; Cabral, Luciana; Coler, Matt; Liebeskind, Chaya; Kernerman, Ilan; Rousi, Rebekah; Prys, Cynog (Research report, 2021)
      New language technologies are coming, thanks to the huge and competing private investment fuelling rapid progress; we can either understand and foresee their effects, or be taken by surprise and spend our time trying to ...
    • DDoS attacks and Countermeasures 

      Rajanna, Puneeth Prasad (Master thesis, 2010)
      Internet has grown leaps and bounds over the last few decades. Internet's phenomenal growth it has attracted users with malicious intent. Distributed Denial of Service (DDoS) attacks have become very common these days. The ...
    • Death anxiety and visual oculomotor processing of arousing stimuli in a free view setting 

      Wendelberg, Linda; Volden, Frode; Yildirim, Sule (Journal article; Peer reviewed, 2017)
      The main goal of this study was to determine how death anxiety (DA) affects visual processing when confronted with arousing stimuli. A total of 26 males and females were primed with either DA or a neutral primer and were ...
    • Decentralized Identity Management Systems and Self-Sovereign Identity 

      Strindberg, Jan Magnus (Master thesis, 2019)
      Med den økende interessen for blockchain-teknologi, foreslås en rekke applikasjoner og bruksområder. Bruk av blockchain til å skape desen- traliserte identitetsstyringssystemer er et lovende bruksområde. Dette skyldes ...
    • Decentralized Self-Enforcing Trust Management System for Social Internet of Things 

      Azad, Muhammad Ajmal; Bag, Samiran; Feng, Hao; Shalaginov, Andrii (Peer reviewed; Journal article, 2020)
      The Internet of Things (IoT) is the network of connected computing devices that have the ability to transfer valued data between each other via the Internet without requiring human intervention. In such a connected ...
    • Decoding GSM 

      Glendrange, Magnus; Hove, Kristian; Hvideberg, Espen (Master thesis, 2010)
      We have participated in the creation of almost two terabytes of tables aimed at cracking A5/1, the most common ciphering algorithm used in GSM. Given 114-bit of known plaintext, we are able to recover the session key with ...