• Radar imaging of small objects closely below the earth surface 

      Eide, Egil S. (Doctoral thesis, 2000)
      This dissertation focuses on subsurface imaging of objects closely below the ground surface using ground penetrating radar (GPR). The main purpose is to detect and image man-made objects such as buried landmines or subsurface ...
    • Radio Access Technology Selection in Heterogeneous Wireless Networks for Revenue Maximization 

      Khloussy, Elissar (Doctoral theses at NTNU;2018:163, Doctoral thesis, 2018)
      Wireless networks have witnessed a great success recently. The number of users along with the traffic demands have grown exponentially. Therefore, the wireless resources of a single Radio Access Technology (RAT) might not ...
    • Rammeverk for formulering av portable krav til informasjonssikkerhet 

      Ween, Morten (Master thesis, 2005)
      NORSK: Når data skal utveksles i et nettverk, eller det skal gis delt tilgang til data fra forskjellige systemer tilknyttet nettverket, vil aktører i forskjellige deler av nettet håndtere og beskrive sikkerhetsspørsmål ...
    • Rate Adaptive Video Streaming over Wireless Networks: Explained & Explored 

      Haukaas, Torgeir (Master thesis, 2007)
      In the search for improved methods of transporting real time video and VoIP over the Internet, new rate control mechanisms need to be developed and standardized. Ongoing research in the field has led to several new protocol ...
    • Rate vulnerability reducing measures for home offices based on a cost effectiveness analysis 

      Lieungh, Steinar (Master thesis, 2005)
      NORSK: Stadig flere bedrifter tar i bruk hjemmekontorløsninger slik at de ansatte kan få muligheten til å jobbe hjemmefra, en eller flere dager i uken. Ved å flytte kontorene ut fra bedriften og hjem til de ansatte, ...
    • Reading the Electricity Meter 

      Aker, Ole-Magnus Røysted (Master thesis, 2014)
      The consumers in today's electricity market need to report their electricity consumption usually every third month, and occasionally even more often. The new paradigm in Norway's electricity system will be the use of smart ...
    • Real time detection and analysis of PDF-files 

      Borg, Knut (Master thesis, 2013)
      ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format being quite versatile. A PDF-file can be used as direct attacks against specific targets like the government, the army or ...
    • Real-time Communication in a Ubiquitous Office Environment 

      Randby, Johan Martin (Master thesis, 2008)
      Combining multiple fixed and mobile terminals to create a real-time communication session can be troublesome. Consider the following scenario: Alice is at work, and wants to place a video call to Tom, who is not currently ...
    • Real-Time End-User Service Composition Using Google Wave 

      Halvorsen, Espen Herseth (Master thesis, 2010)
      This thesis explores Wave, a brand new communication and collaboration platform, from the perspective of end user service composition. A description of the different frameworks that are available and a study of how these ...
    • Real-Time Event Correlation for Windows Event Logs 

      Ingesen, Martin (Master thesis, 2020)
      Nye sårbarheter og angrepsvektor blir funnet hver dag. Cyberangrep kan kritisk skade og påvirke bedrifter som blir angrepet. Mange av disse truslene fokuserer på å penetrere nettverket til bedriften for å stjele verdifull ...
    • REAL-TIME NETWORK INTRUSIONPREVENTION 

      Haslum, Kjetil (Doctoral Theses at NTNU, 1503-8181; 168, Doctoral thesis, 2010)
      It is not economically or technically feasible to make complex computersystems that are completely secure. New attacks are constantly developedby attackers and the security situation can therefore rapidly change. In orderto ...
    • REAL-TIME NETWORK INTRUSIONPREVENTION 

      Haslum, Kjetil (Doctoral Theses at NTNU, 1503-8181; 168, Doctoral thesis, 2010)
      It is not economically or technically feasible to make complex computersystems that are completely secure. New attacks are constantly developedby attackers and the security situation can therefore rapidly change. In orderto ...
    • Real-time people counting system using a single video camera 

      Lefloch, Damien; Cheikh, Faouzi Alaya; Hardeberg, Jon Yngve; Gouton, Pierre; Picot-Clemente, Romain (Proceedings of SPIE;6811, Journal article; Peer reviewed, 2008)
      There is growing interest in video-based solutions for people monitoring and counting in business and security applications. Compared to classic sensor-based solutions the video-based ones allow for more versatile ...
    • Real-Time Phase Ambiguity Resolution in Global Navigation Satellite Systems 

      Svendsen, Jon Glenn (Dr. ingeniøravhandling, 0809-103X; 2001:104, Doctoral thesis, 2002)
      This dissertation focuses on real-time carrier phase ambiguity resolution for high precision solutions in Global Navigation Satellite Systems (GNSS). In order to exploit the full accuracy potential, one must be able to ...
    • Realizing Context-Aware Services through Intelligent Mobile Data Analysis 

      Oplenskedal, Magnus Karsten (Doctoral theses at NTNU;2022:234, Doctoral thesis, 2022)
      In recent years there has been a rapid development of mobile technologies, Internet of Things (IoT) and cellular network infrastructures. In combination with the fast evolution of data analysis, and particularly within ...
    • Realizing Distributed RSA using Secure Multiparty Computations 

      Mauland, Atle (Master thesis, 2009)
      This thesis describes the basic theory of multiparty computation (MPC) in addition to a fully functional distributed Rivest-Shamir-Adleman (RSA) protocol for three players implemented in Virtual Ideal Functionality Framework ...
    • Realizing Secure Multiparty Computations 

      Vegge, Håvard (Master thesis, 2009)
      In this thesis the Virtual Ideal Functionality Framework (VIFF) has been used for implementing practical applications based on multiparty computation (MPC). The work started with a theoretical study of secret sharing and ...
    • Reasoning-based Capability Configuration Management in Adaptable Service Systems 

      Supadulchai, Paramai (Doktoravhandlinger ved NTNU, 1503-8181; 2008:10, Doctoral thesis, 2008)
      Networked Service Systems are considered. Services are realized by service components, which by their inter-working, provide a service in the role of a service provider to service users. During more than two decades, ...
    • Reccoon: automatisert rammeverk for external network footprinting 

      Johnsen, Jan William; Kristoffersen, Kasper (Bachelor thesis, 2014)
      NORSK: Under utføringen av penetrasjonstester er det viktig å begynne hele testen med å hente inn informasjon om kunden og deres nettverk. Dessverre er denne informasjonsinnhentingen en prosess som ofte blir nedprioritert. ...
    • Recent Advancements in Intrusion Detection Systems for the Internet of Things 

      Khan, Zeeshan Ali; Herrmann, Peter (Journal article; Peer reviewed, 2019)
      Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms ...