Blar i SINTEF Digital på tittel
Viser treff 1849-1868 av 2501
-
Scheduling Vehicles with Spatial Conflicts
(Peer reviewed; Journal article, 2022)When scheduling the movement of individual vehicles on a traffic network, one must ensure that they never get too close to one another. This is normally modelled by segmenting the network and forbidding two vehicles to ... -
Schematic Generation of English-prose Semantics for a Risk Analysis Language Based on UML Interactions
(Chapter, 2014)To support risk-driven testing, we have developed CORAL, a language for risk analysis based on UML interactions. In this paper, we present its semantics as a translation of CORAL diagrams into English prose. The CORAL ... -
Schematic Generation of English-prose Semantics for a Risk Analysis Language Based on UML Interactions
(SINTEF Rapport;, Research report, 2014)To support risk-driven testing, we have developed CORAL, a language for risk analysis based on UML interactions. In this paper, we present its semantics as a translation of CORAL diagrams into English prose. The CORAL ... -
Scoping review of economic evaluations of assistive technology globally
(Peer reviewed; Journal article, 2021)The paper presents a scoping review of existing economic evaluations of assistive technology (AT). The study methodology utilized a PRISMA flow approach with final included studies that met an adapted PICOS framework. Types ... -
Screening, Monitoring, and Remediation of Legacy Wells to Improve Reservoir Integrity for Large-Scale CO2 Storage—An Example From the Smeaheia Structure in the Northern North Sea
(Peer reviewed; Journal article, 2022)Carbon capture and storage (CCS) is an inevitable action to achieve CO2 emission reduction targets including becoming net-zero by 2050. Increased efforts are therefore required to identify suitable locations for large-scale ... -
“Seafarers should be navigating by the stars”: barriers to usability in ship bridge design
(Peer reviewed; Journal article, 2022)Navigating a ship is a complex task that requires close interaction between navigators and technology available on the ship’s bridge. The quality of this interaction depends on human and organisational factors, but also ... -
SEATONOMY Design, development and validation of marine autonomous systems and operations
(Journal article, 2015)The SEATONOMY methodology provides a structured approach for design, development and validation of mobile autonomous maritime operations and systems. The goal is to achieve this by providing system developers of autonomous ... -
SEAVENTION - Autonomous underwater intervention
(Lecture, 2018) -
SECOMAS. Final report from the project Spectral Efficient Communications for Aeronautical Services (SECOMAS) - Technical
(Research report, 2011)SECOMAS was a research project running from January 2007 to December 2010 targeting spectral efficient communications for aeronautical services. The Research partners of the project were SINTEF and NTNU, and the project ... -
Secrecy Performance Analysis of Cooperative Nonorthogonal Multiple Access in IoT Networks
(Peer reviewed; Journal article, 2022)Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studied to meet the growing capacity demands of the Internet of Things (IoT) devices for the next-generation networks. However, ... -
The sectoral interdependencies of low-carbon innovations in sustainability transitions
(Research report, 2020)Sectoral interdependencies of low-carbon technologies arguably become increasingly important as sustainability transitions accelerate. Nevertheless, few conceptual and empirical studies examine how the formation of ... -
Secure Collaborative Augmented Reality Framework for Biomedical Informatics
(Peer reviewed; Journal article, 2021)Augmented reality is currently a great interest in biomedical health informatics. At the same time, several challenges have been appeared, in particular with the rapid progress of smart sensors technologies, and medical ... -
Secure Remote Access to Autonomous Safety Systems: A Good Practice Approach
(Journal article; Peer reviewed, 2009)Safety instrumented systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil and natural gas installations. Partly as a consequence of the evolving 'integrated operations' ... -
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations
(Chapter, 2008)Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency ShutdownSystem (ESD) that ensures ... -
SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation
(Chapter, 2022)Security and scalability are core software qualities, which as non-functional aspects share certain characteristics and challenges in how they are approached during software development and operation. Based on expert ... -
Security and Independence of Process Safety and Control Systems in the Petroleum Industry
(Peer reviewed; Journal article, 2022)The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry. A general ... -
Security Checklists: A Compliance Alibi, or a Useful Tool for Water Network Operators?
(Journal article; Peer reviewed, 2014)Checklist Compliance is a term that has been used derisively in the information security community, implying that checklists are something used for paying lip service to security without instigating real changes to technology ... -
Security in Model Driven Development: A Survey
(Chapter, 2011)Model driven development (MDD) is considered a promising approach for software development. In this paper the results of a systematic survey is reported to identify state-of-the-art within the topic of security in model ... -
Security in Service Level Agreements for Cloud Computing
(Chapter, 2011)The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with ... -
Security Incident Information Exchange for Cloud Service Provisioning Chains
(Journal article; Peer reviewed, 2018)Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about ...