• A fully implicit WENO scheme on stratigraphic and unstructured polyhedral grids 

      Lie, Knut-Andreas; Mykkeltvedt, Trine Solberg; Møyner, Olav (Journal article; Peer reviewed, 2019)
      Many authors have used higher-order spatial discretizations to reduce numerical diffusion, which can be particularly pronounced when simulating EOR processes involving active chemical substances that are transported by ...
    • A Gap in Networked Publics? A Comparison of Younger and Older Journalists’ Newsgathering Practices on Social Media 

      Brandtzæg, Petter Bae; Chaparro Domínguez, María Ángeles (Journal article; Peer reviewed, 2018)
      Several recent studies have examined how professional journalists use social media at work. However, we know little about the differences between younger and older journalists’use of social media for newsgathering. We ...
    • A general theory of software engineering: Balancing human, social and organizational capitals 

      Wohlin, Claes; Šmite, Darja; Moe, Nils Brede (Journal article; Peer reviewed, 2015)
      There exists no generally accepted theory in software engineering, and at the same time a scientific discipline needs theories. Some laws, hypotheses and conjectures exist, but yet no generally accepted theory. Several ...
    • A Generic Language and Tool for Variability Modeling 

      Fleurey, Franck; Haugen, Øystein; Møller-Pedersen, Birger; Olsen, Gøran Klepp; Svendsen, Andreas; Zhang, Xiaorui (Research report, 2009)
      This paper presents an approach to variability modeling where variability models are made in a separate, generic language CVL (Common Variability Language) that works with any other language defined by a metamodel. CVL ...
    • A Hermite interpolatory subdivision scheme for C2-quintics on the Powell-Sabin 12-split 

      Lyche, Tom; Muntingh, Agnar Georg Peder (Journal article; Peer reviewed, 2014)
      In order to construct a C1C1-quadratic spline over an arbitrary triangulation, one can split each triangle into 12 subtriangles, resulting in a finer triangulation known as the Powell–Sabin 12-split. It has been shown ...
    • A heuristic for rich maritime inventory routing problems 

      Kloster, Oddvar; Flatberg, Truls; Hasle, Geir (Lecture, 2011)
      In maritime inventory routing, a fleet of vessels is employed to transport products that are produced and consumed in different ports with limited storage capacity. The tight coupling between inventory management and ...
    • A Hybrid Analytics Paradigm Combining Physics-Based Modeling and Data-Driven Modeling to Accelerate Incompressible Flow Solvers 

      Rahman, Sk. Mashfiqur; San, Omer; Rasheed, Adil (Journal article; Peer reviewed, 2018)
      Numerical solution of the incompressible Navier–Stokes equations poses a significant computational challenge due to the solenoidal velocity field constraint. In most computational modeling frameworks, this divergence-free ...
    • A Hybrid Approach for Model Order Reduction of Barotropic Quasi-Geostrophic Turbulence 

      Rahman, Sk. Mashfiqur; San, Omer; Rasheed, Adil (Journal article; Peer reviewed, 2018)
      We put forth a robust reduced-order modeling approach for near real-time prediction of mesoscale flows. In our hybrid-modeling framework, we combine physics-based projection Methods with neural network closures to account ...
    • A hybrid approach for solving real-world nurse rostering problems 

      Stølevik, Martin; Nordlander, Tomas; Frøyseth, Helle; Riise, Atle (Journal article; Peer reviewed, 2011)
      Nurse rostering is the process of creating a plan for nurse working hours over a given time horizon. This problem, most variants of which are NP-hard, has been studied extensively for many years. Still, practical nurse ...
    • A Lightweight Approach to Secure Software Engineering 

      JAATUN, Martin Gilje; Jensen, Jostein; Meland, Per Håkon; Tøndel, Inger Anne (Chapter, 2011)
      Secure software engineering is much more than developing critical software. History has shown us that software bugs and design flaws also represent exploitable security vulnerabilities in seemingly innocuous applications ...
    • A lightweight protocol suite for underwater communication 

      Rustad, Helge (Chapter, 2009)
      A lightweight MAC and network layer protocol suite for underwater acoustic communication has been developed. The protocol suite covers the MAC layer, hop-by-hop acknowledgement, multi-hop routing and transmission and ...
    • A Lower Bound for the Node, Edge, and Arc Routing Problem 

      Bach, Lukas; Hasle, Geir; Wøhlk, Sanne (Journal article; Peer reviewed, 2013)
      The Node, Edge, and Arc Routing Problem (NEARP) was defined by Prins and Bouchenoua in 2004, although similar problems have been studied before. This problem, also called the Mixed Capacitated General Routing Problem ...
    • A Lower Bound for the Node, Edge, and ArcRouting Problem 

      Bach, Lukas; Hasle, Geir; Wøhlk, Sanne (Research report, 2011)
      The Node, Edge, and Arc Routing Problem (NEARP) was defined by Prins and Bouchenoua in 2004. They also proposed a memetic algorithm procedure and defined a set of test instances: the so-called CBMix benchmark. The NEARP ...
    • A mathematical model for the nurse rostering system 

      Stølevik, Martin; Nordlander, Tomas; Riise, Atle (Research report, 2011)
      The model we present in this report is mainly developed on work done together with the company Gatsoft AS. With minor changes and extensions, a version of the model has been implemented and delivered to Gatsoft as a plug-in ...
    • A metamodel and supporting process and tool for specifying quality models in model-based software development 

      Mohagheghi, Parastoo; Dehlen, Vegard; Neple, Tor (Journal article; Peer reviewed, 2008)
    • A Metamodel for Specifying Quality Models in Model-Driven Engineering 

      Mohagheghi, Parastoo; Dehlen, Vegard (Chapter, 2008)
      In the context of model-driven engineering, models act as the primary artifacts and are eventually transformed into other artifacts, such as code and documentation. Consequently, to evaluate and assure the quality of ...
    • A Metamodel for Specifying Quality Models in Model-Driven Engineering 

      Mohagheghi, Parastoo (Lecture, 2008)
      In the context of model-driven engineering, models act as the primary artifacts and are eventually transformed into other artifacts, such as code and documentation. Consequently, to evaluate and assure the quality of ...
    • A Method for Developing Algorithms for Assessing Cyber-Risk Cost 

      Erdogan, Gencer; Refsdal, Atle; Seehusen, Fredrik; Gonzalez, Alejandra (Chapter, 2017)
      We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available ...
    • A Method for Developing Qualitative Security Risk Assessment Algorithms 

      Erdogan, Gencer; Refsdal, Atle (Journal article; Peer reviewed, 2018)
      We present a method for developing qualitative security risk assessment algorithms where the input captures the dynamic state of the target of analysis. This facilitates continuous monitoring. The intended users of the ...
    • A Method for Model-Driven Information Flow Security 

      Seehusen, Fredrik; Stølen, Ketil (Research report, 2009)
      We present a method for software development in which information flow security is taken into consideration from start to finish. Initially, the user of the method (i.e., a software developer) specifies the  ...