• Al-Al thermocompression bonding for wafer-level MEMS sealing 

      Malik, Nishant; Schjølberg-Henriksen, Kari; Poppe, Erik; Taklo, Maaike Margrete Visser; Finstad, Terje (Journal article; Peer reviewed, 2014)
      Al–Al thermocompression bonding has been studied using test structures relevant for wafer level sealing of MEMS devices. Si wafers with protruding frame structures were bonded to planar Si wafers, both covered with a ...
    • Al-Al Wafer-Level Thermocompression Bonding applied for MEMS 

      Taklo, Maaike M. Visser; Schjølberg-Henriksen, Kari; Malik, Nishant; Poppe, Erik Utne; Moe, Sigurd T.; Finstad, Terje (Chapter, 2017)
      Wafer-level thermocompression bonding (TCB) using aluminum (Al) is presented as a hermetic sealing method for MEMS. The process is a CMOS compatible alternative to TCB using metals like gold (Au) and copper (Cu), which are ...
    • ALF - a Framework for Evaluating Accelerated Learning in Industry 

      Petersen, Sobah Abbas; Oliveira, Manuel; Hestetun, Kristin; Sørensen, Anette Østbø (Peer reviewed; Journal article, 2019)
      Games have long been considered as a means to support effective learning, motivate learners and accelerate their learning. Several successful studies using game-based learning are reported in the literature. However, there ...
    • All in a day's work: Password cracking for the rest of us 

      Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo (Chapter, 2009)
      The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ...
    • Ambivalently awaiting: Norwegian general practitioners' expectations towards a cross-Institutional Electronic health record 

      Melby, Line; Andreassen, Hege Kristin; Torsvik, Torbjørn; Ellingsen, Gunnar; Severinsen, Gro-Hilde; Silsand, Line; Ekeland, Anne Granstrøm; Saadatfard, Omid; Pedersen, Rune (Peer reviewed; Journal article, 2019)
      A cross-institutional Electronic Health Record (EHR) where all healthcare workers can access a patient's record, is seen as an important means to improved access to information, better patient care, and increased efficiency. ...
    • Ambulant psykisk helsehjelp til barn i barneverninstitusjoner 

      Ådnanes, Marian; Melby, Line Kari; Kaasbøll, Jannike; Kaspersen, Silje Lill (SINTEF Rapport;2023:00104, Research report, 2023)
      Rapporten presenterer resultater fra en kvalitativ undersøkelse av ambulant psykisk helsehjelp til barn i barnevernsinstitusjoner, gjennomført i januar/februar 2023. Det er gjort intervju med ledere og helseansvarlige i ...
    • An Adaptive Iterated Local Search for the Mixed Capacitated General Routing Problem 

      Dell'Amico, Mauro; Diaz Diaz, Jose Carlos; Hasle, Geir; Iori, Manuel (Research report, 2014)
      We study the Mixed Capacitated General Routing Problem (MCGRP) in which a fleet of capacitated vehicles has to serve a set of requests by traversing a mixed weighted graph. The requests may be located on nodes, edges, and ...
    • An Adaptive Iterated Local Search for the Mixed Capacitated General Routing Problem 

      Dell'Amico, Mauro; Diaz Diaz, Jose Carlos; Hasle, Geir; Iori, Manuel (Journal article; Peer reviewed, 2016)
      We study the mixed capacitated general routing problem (MCGRP) in which a fleet of capacitated vehicles has to serve a set of requests by traversing a mixed weighted graph. The requests may be located on nodes, edges, and ...
    • An Approach for Empirical Evaluation of Model-Driven Engineering in Multiple Dimensions 

      Mohagheghi, Parastoo (Lecture, 2010)
      Evaluating methodologies and tools for software development has been subject of research for a while and various quantitative techniques have emerged. However, a common problem in any evaluation method is to select appropriate ...
    • An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS 

      Tran, Le Minh Sang; Solhaug, Bjørnar; Stølen, Ketil (SINTEF Rapport;, Research report, 2013)
      Security risk analysis should be conducted regularly for organizations to maintain an acceptable level of security. In principle, all risks that are unacceptable according to the predefined criteria should be mitigated. ...
    • An Assessment of Avionics Software Development Practice: Justifications for an Agile Development Process 

      Hanssen, Geir Kjetil; Wedzinga, Gosse; Stuip, Martijn (Lecture Notes in Business Information Processing;283, Chapter, 2017)
      Avionic systems for communication, navigation, and flight control, and many other functions are complex and crucial components of any modern aircraft. Present day avionic systems are increasingly based on computers and a ...
    • An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams 

      Volden-Freberg, Vetle; Erdogan, Gencer (Journal article; Peer reviewed, 2019)
      We report on an empirical study in which we evaluate the comprehensibility of graphical versus textual risk annotations in threat models based on sequence diagrams. The experiment was carried out on two separate groups ...
    • An Energy Harvesting System for In-tire TPMS 

      Thomas, Herndl; Jakob, Jongsma; Franz, Darrer; Terje, Kvisterøy; Christian, Hambeck; Stefan, Mahlknecht; Eskild, Westby; Svein, Husa; Einar, Halvorsen; Vogl, Andreas; Østbø, Niels Peter (Lecture, 2008)
      State of the art Tire Pressure Monitoring Systems (TPMS) are wireless sensor nodes mounted on the rim. Attaching the node on the inner liner of a tire allows sensing of important additional technical parameters, such as ...
    • An Evaluation of a Test-driven Security Risk Analysis Method Based on an Industrial Case Study 

      Erdogan, Gencer; Seehusen, Fredrik; Li, Yan (SINTEF Rapport;, Research report, 2013)
      This report is an evaluation describing the experiences obtained from a case study, carried out in a period of eight months from June 2012 to January 2013, in which we conducted a test-driven security risk analysis. ...
    • An exact decomposition approach for the real-time train dispatching problem 

      Lamorgese, Leonardo Cameron; Mannino, Carlo (SINTEF Rapport;, Research report, 2012)
      Trains movement on a railway network are regulated by the official timetables. Deviations and delays occur quite often in practice, asking for fast rescheduling and rerouting decisions in order to avoid conflicts and ...
    • An exact decomposition approach for the real-time Train Dispatching problem (v.2) 

      Lamorgese, Leonardo Cameron; Mannino, Carlo (Research report, 2013)
      Trains movements on a railway network are regulated by official timetables. Deviations and delays occur quite often in practice, demanding fast re-scheduling and re-routing decisions in order to avoid conflicts and minimize ...
    • An Examination of Task-Technology Fit in Public Administration and Management: A Configurational Approach 

      Mikalef, Patrick; Torvatn, Hans Yngvar (Journal article, 2019)
      In spite of heavy investments in digital technologies in the public sector over the past couple of decades, one of the most important issues regarding the value realized from them is that in many cases he technologies used ...
    • An experimental evaluation of bow-tie analysis for cybersecurity requirements 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Bow-tie analysis includes a graphical representation for depicting threats and consequences related to unwanted events, and shows how preventive and reactive barriers can provide control over such situations. This kind of ...
    • An Experimental Facility for Cross-layer Adaptation of Service Oriented Distributed Systems 

      Jiang, Shanshan; Hallsteinsen, Svein Olav; Lie, Arne (Journal article; Peer reviewed, 2011)
      Ubiquitous and IoT (Internet of Things) systems consist of many parts, are highly distributed and need to be adaptive in a highly dynamic environment. The exploitation of adaptation possibilities at different layers needs ...