• Exact and over-approximated guarantees for corner cutting avoidance in a multi-obstacle environment 

      Grøtli, Esten Ingar; Stoican, Florin; Prodan, Ionela (Journal article; Peer reviewed, 2018)
      The corner cutting avoidance problem is an important but often overlooked part of motion planning strategies. Obstacle and collision avoidance constraints are usually imposed at the sampling time without regards to the ...
    • Examining the most accident-prone sector within commercial aviation: Why do accidents with light inland helicopters occur, and how can we improve safety? 

      Nævestad, Tor-Olav; Bye, Rolf Johan; Antonsen, Stian; Berge, Siri Hegna; Hesjevoll, Ingeborg Storesund; Elvebakk, Beate (Peer reviewed; Journal article, 2021)
      Light inland helicopter has for several years been the most accident-prone sector within commercial aviation, with a more than 10 times higher accident risk than offshore helicopters. The main aims of this article are to: ...
    • Existing Model Metrics and Relations to Model Quality 

      Mohagheghi, Parastoo; Dehlen, Vegard (Chapter, 2009)
      This paper presents quality goals for models and provides a state-of-the-art analysis regarding model metrics. While model-based software development often requires assessing the quality of models at different abstraction ...
    • Experiences from Developing an Algorithm to Support Risk-Based Decisions for Offshore Installations 

      Erdogan, Gencer; Refsdal, Atle; Nygård, Bjørn; Randeberg, Bernt Kvam; Rosland, Ole Petter (Chapter, 2017)
      We present our experiences from developing a decision model to support risk-based decisions on offshore installations. The model was developed using the DEXi tool for multi- criteria decision modeling. We report on the ...
    • Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis 

      Ligaarden, Olav Skjelkvåle; Refsdal, Atle; Stølen, Ketil (SINTEF Rapport;, Research report, 2012)
      Expert judgments are often used to estimate likelihood values in a security risk analysis. These judgments are subjective and their correctness rely on the competence, training, and experience of the experts. Thus, there ...
    • Experiences of Developing a Network Modeling Tool Using the Eclipse Environment 

      Evans, Andy; Fernandez, Miguel-Anglel; Mohagheghi, Parastoo (Journal article; Peer reviewed, 2009)
      Domain-specific modeling solutions have been promoted for some time in order to improve the productivity of software developers by providing them with modeling environments that are easier to learn, integrate best solutions ...
    • Experiences of main risks and mitigation in autonomous transport systems 

      Johnsen, Stig Ole; Hoem, Åsa Snilstveit; Jenssen, Gunnar; Moen, Terje (Journal article; Peer reviewed, 2019)
      This paper discusses experiences, risks and mitigation in autonomous transport systems, to improve learning and risk-based governance. This is based on literature reviews, experiences of autonomous transport systems and ...
    • Experimental Security Analysis of Connected Pacemakers 

      Bour, Guillaume; Moe, Marie Elisabeth Gaup; Borgaonkar, Ravishankar Bhaskarrao (Chapter, 2022)
      Medical devices and their connectivity capabilities are providing a variety of benefits to the healthcare domain, including remote monitoring, automated alerts, and improved patient outcomes. However, these medical devices ...
    • Experimenting a Digital Collaborative Platform for Supporting Social Innovation in Multiple Settings 

      Vilarinho, Thomas; Floch, Jacqueline; Pappas, Ilias; Mora, Simone; Oliveira, Manuel Fradinho; Dinant, Inès; Jaccheri, Maria Letizia (Communications in Computer and Information Science;863, Chapter, 2018)
      Social Innovation is gaining popularity as an approach to address societal challenges. Governments, charities, NGOS and organizations are taking up the role of facilitating citizens participation into social innovation ...
    • Experiments on the Node, Edge, and Arc Routing Problem 

      Hasle, Geir; Kloster, Oddvar; Smedsrud, Morten; Gaze, Kevin (Research report, 2012)
      The Node, Edge, and Arc Routing Problem (NEARP) was defined by Prins and Bouchenoua in 2004 along with the first benchmark called CBMix. The NEARP generalizes the classical Capacitated Vehicle Routing Problem (CVRP), the ...
    • Exploiting Cooperative Downlink NOMA in D2D Communications 

      Rauniyar, Ashish; Østerbø, Olav; Håkegård, Jan Erik; Engelstad, Paal E. (Peer reviewed; Journal article, 2023)
      We propose and investigate a bidirectional device-to-device (D2D) transmission scheme that exploits cooperative downlink non-orthogonal multiple access (NOMA) (termed as BCD-NOMA). In BCD-NOMA, two source nodes communicate ...
    • Exploring alternative economic pathways: a comparison of foundational economy and Doughnut economics 

      Wahlund, Madeleine; Hansen, Teis (Peer reviewed; Journal article, 2022)
      A number of intersecting crises are currently ongoing at multiple scales, including increasing inequality, environmental degradation, and climate destabilization, as well as new surges of populism and mounting public health ...
    • Exploring cross-site networking in large-scale distributed projects 

      Sablis, Aivars; Smite, Darja; Moe, Nils Brede (Lecture Notes in Computer Science;11271, Journal article; Peer reviewed, 2018)
      Context: Networking in a distributed large-scale project is complex because of many reasons: time zone problems can make it challenging to reach remote contacts, teams rarely meet face-to-face which means that remote project ...
    • Exploring Decomposition for Solving Pattern Mining Problems 

      Djenouri, Youcef; Lin, Jerry Chun-Wei; Nørvåg, Kjetil; Ramampiaro, Heri; Yu, Philip S. (Peer reviewed; Journal article, 2021)
      This article introduces a highly efficient pattern mining technique called Clustering-based Pattern Mining (CBPM). This technique discovers relevant patterns by studying the correlation between transactions in the transaction ...
    • Exploring Decomposition for Solving Pattern Mining Problems 

      Djenouri, Youcef; Lin, Jerry Chun-Wei; Nørvåg, Kjetil; Ramampiaro, Heri; Yu, Philip S. (Peer reviewed; Journal article, 2021)
      This article introduces a highly efficient pattern mining technique called Clustering-based Pattern Mining (CBPM). This technique discovers relevant patterns by studying the correlation between transactions in the transaction ...
    • Exploring employee interactions and quality of contributions in intra‐organisational innovation platforms 

      Chasanidou, Dimitra; Sivertstøl, Njål; Hildrum, Jarle (Journal article; Peer reviewed, 2018)
      This study builds on the innovation management and organizational knowledge networks to examine the user interactions in an intra‐organizational innovation platform of a Norwegian telecommunications operator, as well as ...
    • Exploring human factors of the agile software tester 

      Stray, Viktoria; Florea, Raluca-Madalina; Paruch, Lucas (Peer reviewed; Journal article, 2021)
      Although extensive research has been conducted on the characteristics of the agile developer, little attention has been given to the features of the software-testing role. This paper explores the human factors of the ...
    • Exploring Norms in Agile Software Teams 

      Stray, Viktoria; Fægri, Tor Erlend; Moe, Nils Brede (Peer reviewed; Journal article, 2016)
      The majority of software developers work in teams and are thus influenced by team norms. Norms are shared expectations of how to behave and regulate the interaction between team members. Our aim of this study is to gain ...
    • Exploring Pattern Mining Algorithms for Hashtag Retrieval Problem 

      Belhadi, Asma; Djenouri, Youcef; Lin, Jerry Chun-Wei; Zhang, Chongsheng; Cano, Alberto (Peer reviewed; Journal article, 2020)
      Hashtag is an iconic feature to retrieve the hot topics of discussion on Twitter or other social networks. This paper incorporates the pattern mining approaches to improve the accuracy of retrieving the relevant information ...
    • Exploring Pattern Mining Algorithms for Hashtag Retrieval Problem 

      Djenouri, Youcef; Asma, Belhadi; Jerry, Chun-Wei Lin; Chongsheng, Zhang; Alberto, Cano (Peer reviewed; Journal article, 2020)
      Hashtag is an iconic feature to retrieve the hot topics of discussion on Twitter or other social networks. This paper incorporates the pattern mining approaches to improve the accuracy of retrieving the relevant information ...