Blar i SINTEF Digital på tittel
Viser treff 41-60 av 2381
-
A fully implicit WENO scheme on stratigraphic and unstructured polyhedral grids
(Journal article; Peer reviewed, 2019)Many authors have used higher-order spatial discretizations to reduce numerical diffusion, which can be particularly pronounced when simulating EOR processes involving active chemical substances that are transported by ... -
A Gap in Networked Publics? A Comparison of Younger and Older Journalists’ Newsgathering Practices on Social Media
(Journal article; Peer reviewed, 2018)Several recent studies have examined how professional journalists use social media at work. However, we know little about the differences between younger and older journalists’use of social media for newsgathering. We ... -
A general theory of software engineering: Balancing human, social and organizational capitals
(Journal article; Peer reviewed, 2015)There exists no generally accepted theory in software engineering, and at the same time a scientific discipline needs theories. Some laws, hypotheses and conjectures exist, but yet no generally accepted theory. Several ... -
A Generic Language and Tool for Variability Modeling
(Research report, 2009)This paper presents an approach to variability modeling where variability models are made in a separate, generic language CVL (Common Variability Language) that works with any other language defined by a metamodel. CVL ... -
A Hermite interpolatory subdivision scheme for C2-quintics on the Powell-Sabin 12-split
(Journal article; Peer reviewed, 2014)In order to construct a C1C1-quadratic spline over an arbitrary triangulation, one can split each triangle into 12 subtriangles, resulting in a finer triangulation known as the Powell–Sabin 12-split. It has been shown ... -
A heuristic for rich maritime inventory routing problems
(Lecture, 2011)In maritime inventory routing, a fleet of vessels is employed to transport products that are produced and consumed in different ports with limited storage capacity. The tight coupling between inventory management and ... -
A Hybrid Analytics Paradigm Combining Physics-Based Modeling and Data-Driven Modeling to Accelerate Incompressible Flow Solvers
(Journal article; Peer reviewed, 2018)Numerical solution of the incompressible Navier–Stokes equations poses a significant computational challenge due to the solenoidal velocity field constraint. In most computational modeling frameworks, this divergence-free ... -
A Hybrid Approach for Model Order Reduction of Barotropic Quasi-Geostrophic Turbulence
(Journal article; Peer reviewed, 2018)We put forth a robust reduced-order modeling approach for near real-time prediction of mesoscale flows. In our hybrid-modeling framework, we combine physics-based projection Methods with neural network closures to account ... -
A hybrid approach for solving real-world nurse rostering problems
(Journal article; Peer reviewed, 2011)Nurse rostering is the process of creating a plan for nurse working hours over a given time horizon. This problem, most variants of which are NP-hard, has been studied extensively for many years. Still, practical nurse ... -
A Lightweight Approach to Secure Software Engineering
(Chapter, 2011)Secure software engineering is much more than developing critical software. History has shown us that software bugs and design flaws also represent exploitable security vulnerabilities in seemingly innocuous applications ... -
A lightweight protocol suite for underwater communication
(Chapter, 2009)A lightweight MAC and network layer protocol suite for underwater acoustic communication has been developed. The protocol suite covers the MAC layer, hop-by-hop acknowledgement, multi-hop routing and transmission and ... -
A Lower Bound for the Node, Edge, and Arc Routing Problem
(Journal article; Peer reviewed, 2013)The Node, Edge, and Arc Routing Problem (NEARP) was defined by Prins and Bouchenoua in 2004, although similar problems have been studied before. This problem, also called the Mixed Capacitated General Routing Problem ... -
A Lower Bound for the Node, Edge, and ArcRouting Problem
(Research report, 2011)The Node, Edge, and Arc Routing Problem (NEARP) was defined by Prins and Bouchenoua in 2004. They also proposed a memetic algorithm procedure and defined a set of test instances: the so-called CBMix benchmark. The NEARP ... -
A mathematical model for the nurse rostering system
(Research report, 2011)The model we present in this report is mainly developed on work done together with the company Gatsoft AS. With minor changes and extensions, a version of the model has been implemented and delivered to Gatsoft as a plug-in ... -
A metamodel and supporting process and tool for specifying quality models in model-based software development
(Journal article; Peer reviewed, 2008) -
A Metamodel for Specifying Quality Models in Model-Driven Engineering
(Chapter, 2008)In the context of model-driven engineering, models act as the primary artifacts and are eventually transformed into other artifacts, such as code and documentation. Consequently, to evaluate and assure the quality of ... -
A Metamodel for Specifying Quality Models in Model-Driven Engineering
(Lecture, 2008)In the context of model-driven engineering, models act as the primary artifacts and are eventually transformed into other artifacts, such as code and documentation. Consequently, to evaluate and assure the quality of ... -
A Method for Developing Algorithms for Assessing Cyber-Risk Cost
(Chapter, 2017)We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available ... -
A Method for Developing Qualitative Security Risk Assessment Algorithms
(Journal article; Peer reviewed, 2018)We present a method for developing qualitative security risk assessment algorithms where the input captures the dynamic state of the target of analysis. This facilitates continuous monitoring. The intended users of the ... -
A Method for Model-Driven Information Flow Security
(Research report, 2009)We present a method for software development in which information flow security is taken into consideration from start to finish. Initially, the user of the method (i.e., a software developer) specifies the ...