• The Snow Grooming Routing Problem 

      Andersson, Carl Henrik; Høyland, Sondre; Krogstad, Jesper Anker; Flatberg, Truls; Gullhav, Anders Nordby (Peer reviewed; Journal article, 2023)
      There are more than 30,000 km of cross-country skiing tracks in Norway, and to maintain these track networks municipalities and local ski clubs spend more than 250 million NOK every year. The primary cost driver is the ...
    • Social Constructionism in Security Protocols 

      Foley, Simon N.; Rooney, Vivien (Peer reviewed; Journal article, 2020)
      Understanding the human in computer security through Qualitative Research aims at a conceptual repositioning. The aim is to leverage individual human experience to understand and improve the impact of humans in computer ...
    • Social Constructionism in Security Protocols (Transcript of Discussion) 

      Foley, Simon N.; Rooney, Vivien (Peer reviewed; Journal article, 2020)
      This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Vivien’s an applied psychologist. We’re interested in understanding how humans experience working with security protocols. ...
    • SP-BERT: A Language Model for Political Text in Scandinavian Languages 

      Doan, Tu My; Kille, Benjamin Uwe; Gulla, Jon Atle (Journal article, 2023)
      Language models are at the core of modern Natural Language Processing. We present a new BERT-style language model dedicated to political texts in Scandinavian languages. Concretely, we introduce SP-BERT, a model trained ...
    • Spectral estimation of chromatically adapted corresponding colors 

      Habib, Syeda Tanzima; Green, Philip John (Journal article; Peer reviewed, 2019)
      This paper reviews the estimation of spectral reflectance for corresponding colors in XYZ color space, including both corresponding color data sets and chromatically adapted colorimetry. For use in color management workflows, ...
    • Symmetric Key Exchange with Full Forward Security and Robust Synchronization 

      Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise (Peer reviewed; Journal article, 2021)
      We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous ...
    • Task-driven Compression for Collision Encoding based on Depth Images 

      Kulkarni, Mihir; Alexis, Konstantinos (Peer reviewed; Journal article, 2023)
      This paper contributes a novel learning-based method for aggressive task-driven compression of depth images and their encoding as images tailored to collision prediction for robotic systems. A novel 3D image processing ...
    • Technology-Enhanced Organizational Learning: A Systematic Literature Review 

      Giannakos, Michail; Mikalef, Patrick; Pappas, Ilias (Journal article; Peer reviewed, 2019)
      E-Learning systems are receiving ever increasing attention in, academia, businesses as well as in public administrations. Managers and employee who need efficient forms of training as well as learning flow within the ...
    • The Role of Big Data in Addressing Societal Challenges: A Systematic Mapping Study 

      Quayyum, Farzana; Pappas, Ilias; Jaccheri, Letizia (Journal article; Peer reviewed, 2019)
      Big data has recently become the focus of academic and corporate investigation due to its high potential in generating business and social value. We have done a systematic mapping of the literature related to big data and ...
    • Tighter Security for Generic Authenticated Key Exchange in the QROM 

      Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      Home Advances in Cryptology – ASIACRYPT 2023 Conference paper Tighter Security for Generic Authenticated Key Exchange in the QROM Download book PDF Download book EPUB Tighter Security for Generic Authenticated Key ...
    • Toward Employee-Driven Digital Innovation in Public Organizations Through the Use of Action Design Research 

      Opland, Leif Erik; Jaccheri, Maria Letizia; Engesmo, Jostein; Pappas, Ilias (Peer reviewed; Journal article, 2020)
      Innovation is important for development in the private sector, but inevitably public sector also needs innovation to enhance services and processes, with research on employee-driven digital innovation in public organizations ...
    • Towards Cloud Storage Tier Optimization with Rule-Based Classification 

      Khan, Akif Quddus; Nikolov, Nikolay Vladimirov; Matskin, Mihhail; Prodan, Radu; Bussler, Christoph; Roman, Dumitru; Soylu, Ahmet (Peer reviewed; Journal article, 2023)
      Cloud storage adoption has increased over the years as more and more data has been produced with particularly high demand for fast processing and low latency. To meet the users’ demands and to provide a cost-effective ...
    • Towards Optimal Ship Navigation Using Image Processing 

      Sahin, Bekir; Uddin, Zia; Soylu, Ahmet (Peer reviewed; Journal article, 2020)
      Shipping transportation developed over years with the technological advancements. Modern ship navigation is conducted with the help of Automatic Radar Plotting Aid (ARPA) and Electronic Chart Display and Information System ...
    • Tramp Ship Routing with Bunker Optimization and Flexible Cargo Quantities: Case from Dry Bulk Shipping 

      Omholt-Jensen, Simen; Fagerholt, Kjetil; Meisel, Frank (Peer reviewed; Journal article, 2023)
      We study the Tramp Ship Routing and Scheduling Problem with Bunker Optimization (TSRSPBO). The TSRSPBO includes, in addition to the routing and scheduling of the vessels in the given fleet, decisions about how much to ...
    • Unbounded HIBE with Tight Security 

      Langrehr, Roman; Pan, Jiaxin (Peer reviewed; Journal article, 2020)
      We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) scheme based on standard assumptions. Our main technical contribution is a novel proof strategy that allows us to tightly ...
    • Unconditionally Secure NIZK in the Fine-Grained Setting 

      Wang, Yuyu; Pan, Jiaxin (Peer reviewed; Journal article, 2022)
      Non-interactive zero-knowledge (NIZK) proof systems are often constructed based on cryptographic assumptions. In this paper, we propose the first unconditionally secure NIZK system in the AC0 -fine-grained setting. More ...
    • Understanding Civic Engagement on Social Media Based on Users’ Motivation to Contribute 

      Hofmann, Sara; Pappas, Ilias (Peer reviewed; Journal article, 2021)
      Socialmediaoffervariousopportunitiesforcivicengagementby,e.g., liking, sharing, or posting relevant content. Users’ motivation to contribute to relevant topics is quite divers and can stem from an intrinsic motivation to ...
    • Understanding Organizations Through Systems Oriented Design: Mapping Critical Intervention Points for Universal Design 

      Ludwig, Karina; Begnum, Miriam Eileen Nes; Blaasvær, Linda (Peer reviewed; Journal article, 2020)
      This paper discusses how organisations pro-actively can ensure compliance with disciplinary best practice and regulations on Universal Design (UD) of ICT. We apply system-oriented design to analyse and engineer organisational ...
    • Understanding the Value of Using Smartphones for Older Adults in China: A Value-Focused Thinking Approach 

      Gao, Shang; Li, Ying; Guo, Hong (Journal article; Peer reviewed, 2019)
      This study aims to explore the values of using smartphones in older adults’ daily lives in China. The value of using smartphones can be seen as the benefits associated with the use of smartphones in peoples’ daily activities. ...
    • Universal Design of ICT: A Historical Journey from Specialized Adaptations Towards Designing for Diversity 

      Begnum, Miriam Eileen Nes (Peer reviewed; Journal article, 2020)
      Over the last decades, the field of computer science has moved from specialized adaptations and add-on assistive technologies, toward universal solutions catering to a diverse set of user needs. Two paradigm shifts have ...