Blar i Publikasjoner fra CRIStin - NTNU på tidsskrift "Lecture Notes in Computer Science (LNCS)"
Viser treff 81-100 av 134
-
Organizational Culture Challenges of Adopting Big Data: A Systematic Literature Review
(Peer reviewed; Journal article, 2019)The interest of adopting big data (BD) in organizations has emerged in recent years. Even though many organizations have attempted to adopt BD, the benefits gained by this investment has been limited, and organizations ... -
Planning LNG Annual Delivery Programs with Speed Optimization and Multiple Loading Ports
(Peer reviewed; Journal article, 2023)We study the planning problem of creating Annual Delivery Programs (ADPs) in the Liquefied Natural Gas Industry (LNG), in which an LNG producer must fulfill a series of long-term contracts for LNG deliveries with customers ... -
Practical Isogeny-Based Key-Exchange with Optimal Tightness
(Journal article; Peer reviewed, 2021)We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ... -
Predicting bending moments with machine learning
(Peer reviewed; Journal article, 2019)We investigate the possibility of predicting the bending moment of slender structures based on a limited number of deflection measurements. These predictions can help to estimate the wear and tear of the structures. We ... -
Professional Development for In-Service Teachers of Programming: Evaluation of a University-Level Program
(Peer reviewed; Journal article, 2021)Professional Development (PD) organizations provide training programs for computer science teachers through teacher PD. Programming as part of a teacher’s PD has grown in importance in K-12 education. As a result, an ... -
Quantifying the Effect of Flexibility and Information Sharing in Transportation Planning
(Peer reviewed; Journal article, 2020)In this paper, we analyze the effect of information sharing between a wholesaler and a transport company in the Norwegian grocery supply chain. The planning process of each company is formulated as a set covering problem, ... -
Quantifying the Re-identification Risk of Event Logs for Process Mining
(Peer reviewed; Journal article, 2020)Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning ... -
Reality Pregnancy and the Online Recolonization of the Female Body
(Peer reviewed; Journal article, 2023)This study defines and operationalizes reality pregnancy in the context of recolonization as an emerging composite construct. Using partial least squares, the concept of reality pregnancy is shown to have strong significance, ... -
Reflection on how to write the learning outcomes for an online programming course for teachers
(Peer reviewed; Journal article, 2019)The EU Commission for Higher Education through the Bologna Process declaration has put into action a series of reforms. One of the reforms is the development of learning outcomes in the European Credit Transfer and ... -
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting
(Peer reviewed; Journal article, 2020)In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jakobsson (JCJ) and in particular the attempts to make it usable and practical. In JCJ the user needs to handle cryptographic ... -
The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills
(Peer reviewed; Journal article, 2022)The emergence of synthetic media such as deep fakes is considered to be a disruptive technology shaping the fight against cybercrime as well as enabling political disinformation. Deep faked material exploits humans’ ... -
The Role of Organizational Culture on Artificial Intelligence Capabilities and Organizational Performance
(Journal article; Peer reviewed, 2022) -
Searching for Unique Neural Descriptors of Primary Colours in EEG Signals: A Classification Study
(Peer reviewed; Journal article, 2021)Identifying unique descriptors for primary colours in EEG signals will open the way to Brain-Computer Interface (BCI) systems that can control devices by exposure to primary colours. This study is aimed to identify such ... -
Secure channels and termination: The last word on TLS
(Peer reviewed; Journal article, 2019)Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channel. In this work we ... -
Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study
(Peer reviewed; Journal article, 2021)With the increasing popularization of cybersecurity concepts due to ever increasing cybersecurity incidents, it is no secret that countries worldwide are investing heavily in cybersecurity education to build the necessary ... -
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study
(Peer reviewed; Journal article, 2022)Cyber security is a big challenge nowadays. However, the lack of qualified individuals and awareness is making the current situation more problematic. One way to address this problem is through National cyber security ... -
Sentiment Polarity and Emotion Detection from Tweets Using Distant Supervision and Deep Learning Models
(Journal article; Peer reviewed, 2022) -
Short Identity-Based Signatures with Tight Security from Lattices
(Peer reviewed; Journal article, 2021)We construct a short and adaptively secure identity-based signature scheme tightly based on the well-known Short Integer Solution (SIS) assumption. Although identity-based signature schemes can be tightly constructed from ... -
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
(Peer reviewed; Journal article, 2020)Marked mix-nets were introduced by Pereira and Rivest as a mechanism to allow very efficient mixing that ensures privacy but at the cost of not guaranteeing integrity. This is useful in a number of e-voting schemes such ... -
Signatures in Shape analysis: An efficient approach to motion identification
(Peer reviewed; Journal article, 2019)Signatures provide a succinct description of certain features of paths in a reparametrization invariant way. We propose a method for classifying shapes based on signatures, and compare it to current approaches based on the ...