• A Robotic Concept for Remote Inspection and Maintenance on Oil Platforms 

      Kyrkjebø, Erik; Liljebäck, Pål; Transeth, Aksel Andreas (Chapter, 2009)
      This paper will present a novel concept for remote inspection and maintenance operations on next generation partly unmanned offshore oil platforms. The concept is presented throughthe design of a robotic lab facility for ...
    • A secure MANET routing protocol for first responders 

      Nyre, Åsmund Ahlmann; JAATUN, Martin Gilje; Tøndel, Inger Anne (Chapter, 2011)
      Emergency and rescue operations are often carried out in areas where the network infrastructure cannot be relied on for message exchange between first responders. Since the fundamental feature of Mobile Ad Hoc Network is ...
    • A Semi-automatic approach Transformation approach for Semantic Interoperability 

      Wang, Sixuan; Morin, Brice; Roman, Dumitru; Berre, Arne- Jørgen (Chapter, 2011)
      As data exchange and model transformation become ubiquitous nowadays, it is a key requirement to improve interoperability of enterprise systems at the semantic level. Many approaches in Model-driven Architecture (MDA) and ...
    • A server-side approach to privacy policy matching 

      Nyre, Åsmund Ahlmann; Bernsmed, Karin; Bø, Solvår; Pedersen, Stian (Chapter, 2011)
      With the increasing use of online services that require sharing of information there is a need for Privacy Enhancing Technology tailored for personal information con- trol. Commonly, web privacy is handled through matching ...
    • A Service Design Thinking Approach for Stakeholder-Centred eHealth 

      Lee, Eunji (Chapter, 2016)
      Studies have described the opportunities and challenges of applying service design techniques to health services, but empirical evidence on how such techniques can be implemented in the context of eHealth services is still ...
    • A snake-like robot for internal inspection of complex pipe structures (PIKo) 

      Fjerdingen, Sigurd Aksnes; Liljeback, Pål; Transeth, Aksel Andreas (Chapter, 2009)
    • A survey on security in Mobile Ad Hoc Networks 

      Nyre, Åsmund Ahlmann (Chapter, 2011)
      Mobile ad hoc networks (MANETs) has for several years been viewed as a promising technology for several application areas where fixed infrastructure is either unreliable or non-existent. Although the technology has been ...
    • A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams 

      Erdogan, Gencer; Refsdal, Atle; Stølen, Ketil (Chapter, 2014)
      Risk-driven testing is a testing approach that aims at focusing the testing process on the aspects or features of the system under test that are most exposed to risk. Current risk-driven testing approaches succeed in ...
    • A Visual Data Profiling Tool for Data Preparation 

      Zernichow, Bjørn Marius von; Roman, Dumitru (Chapter, 2017)
      In this paper, we propose a tool that implements visual data profiling capabilities for data preparation – an essential step in the process of linked data generation. Our tool features visual data profiling – a technique ...
    • Accountability Requirements for the Cloud 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Chapter, 2017)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ...
    • Achieving "Good Enough" Software Security: The Role of Objectivity 

      Tøndel, Inger Anne; Cruzes, Daniela Soares; Jaatun, Martin Gilje (Chapter, 2020)
      Today's software development projects need to consider security as one of the qualities the software should possess. However, overspending on security will imply that the software will become more expensive and often also ...
    • Achieving "Good Enough" Software Security: The Role of Objectivity 

      Tøndel, Inger Anne; Cruzes, Daniela Soares; Jaatun, Martin Gilje (Chapter, 2020)
      Today's software development projects need to consider security as one of the qualities the software should possess. However, overspending on security will imply that the software will become more expensive and often also ...
    • Active camera control with obstacle avoidance for remote operations with industrial manipulators: Implementation and experimental results 

      Bjerkeng, Magnus; Transeth, Aksel Andreas; Pettersen, Kristin Ytterstad; Kyrkjebø, Erik; Fjerdingen, Sigrud Aksnes (Chapter, 2011)
      Remote controlled robots on offshore oil and gas platforms can potentially reduce costs and improve environment, health and safety issues. A key to successful remote control is to provide onshore operators with a sufficient ...
    • Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs 

      Erdogan, Gencer; Sperstad, Iver Bakken; Garau, Michele; Gjerde, Oddbjørn; Tøndel, Inger Anne; Tokas, Shukun; Jaatun, Martin Gilje (Communications in Computer and Information Science;1859, Chapter; Peer reviewed, 2023)
      Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs
    • Adaptive Underwater Robotic Sampling of Dispersal Dynamics in the Coastal Ocean 

      Berget, Gunhild Elisabeth; Eidsvik, Jo; Alver, Morten; Py, Frédéric; Grøtli, Esten Ingar; Johansen, Tor Arne (Chapter, 2022)
      To get a better understanding of the highly nonlinear processes driving the ocean, efficient and informative sampling is critical. By combining robotic sampling with ocean models we are able to choose informative sampling ...
    • Additive Manufacturing of Spare Parts in the Maritime Industry: Knowledge Gaps for Developing a Norwegian AM-Based Business Ecosystem for Maritime Spare Parts 

      Halvorsen, Trond; Lamvik, Gunnar Martin (Chapter; Peer reviewed, 2021)
      Additive Manufacturing (AM), also known as industrial 3D printing, is a high skill technology that can improve the safety level in the maritime industry, reduce costs for the actors and lead to environmental improvement ...
    • Agile Digital Transformation: A Case Study of Interdependencies 

      Mikalsen, Marius; Moe, Nils Brede; Stray, Viktoria; Nyrud, Helga (Chapter; Peer reviewed, 2018)
      Current digital transformation moves information systems development into larger transformation programs with higher strategic significance and increased complexity in organization. Agile and BizDev are among the practical ...
    • Agile Scalability Requirements 

      Brataas, Gunnar; Fægri, Tor Erlend (Chapter, 2017)
      Many software organisations struggle to provide appropriate levels of scalability in their software systems. Agile development rests on pragmatic and value-centred approaches to requirement capture that allows customers ...
    • AI-Based Edge Acquisition, Processing and Analytics for Industrial Food Production 

      Vermesan, Ovidiu; Bellmann, Ronnie Otto; Bahr, Roy; Martinsen, Jøran Edell; Kristoffersen, Anders; Hjertaker, Torgeir; Breiland, John; Andersen, Karl; Sand, Hans Erik; Lindberg, David (Chapter, 2022)
      This article presents a novel approach to the acquisition, processing, and analytics of industrial food production by employing state-of-the-art artificial intelligence (AI) at the edge. Intelligent Industrial Internet of ...
    • Al-Al Wafer-Level Thermocompression Bonding applied for MEMS 

      Taklo, Maaike M. Visser; Schjølberg-Henriksen, Kari; Malik, Nishant; Poppe, Erik Utne; Moe, Sigurd T.; Finstad, Terje (Chapter, 2017)
      Wafer-level thermocompression bonding (TCB) using aluminum (Al) is presented as a hermetic sealing method for MEMS. The process is a CMOS compatible alternative to TCB using metals like gold (Au) and copper (Cu), which are ...