Now showing items 1141-1160 of 2523

    • GPU Computing with Python: Performance, Energy Efficiency and Usability 

      Holm, Håvard Heitlo; Brodtkorb, André R.; Sætra, Martin Lilleeng (Journal article; Peer reviewed, 2020)
      In this work, we examine the performance, energy efficiency, and usability when using Python for developing high-performance computing codes running on the graphics processing unit (GPU). We investigate the portability of ...
    • DataBio Deliverable D4.4 – Service Documentation 

      Roussopoulos, Konstantinos; Hara, Stefanou; Simarro, Javier Hitado; Palomares, Miguel Angel Esbri; Södergård, Caj; Siltanen, Pekka; Kalaoja, Jarmo; Habyarimana, Ephrem; Kubo, Baldur; Senner, Ivo; Fournier, Fabiana; Berre, Arne- Jørgen; Tsalgatidou, Aphrodite; Coene, Yves; Auran, Per Gunnar; Kepka, Michal; Charvat, Karel; Charvát jr, Karel; Rogotis, Savvas; Krommydas, Stamatis (H2020 732064;D4.4, Research report, 2019-12)
      The public deliverable D4.4 describes the software components and processes (here called pipelines as the processes mostly consist of Big Data volumes streaming through successive processing steps) to be utilized by the ...
    • Safety when implementing digital Technology and Infrastructure. 

      Stene, Trine Marie (Proceedings of the 29th European Safety and Reliability Conference(ESREL);, Chapter; Peer reviewed, 2019)
      Increasing critical infrastructure (CI) resilience is a European strategy to enhance safety and security. A digital radio standard for the rail have been developed by The International Union of Railways (UIC) - The Global ...
    • An Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations 

      Omerovic, Aida; Vefsnmo, Hanne; Gjerde, Oddbjørn; Ravndal, Siri T.; Kvinnesland, Are (Lecture Notes in Computer Science;12026, Chapter; Peer reviewed, 2020)
      We have in an earlier study proposed a set of requirements and an approach to identification and modelling of cybersecurity risks and their impacts on safety, within the context of smart power grids. The approach, which ...
    • Enterprise Agility: A Balancing Act - A Local Government Case Study 

      Barroca, Leonor; Sharp, Helen; Dingsøyr, Torgeir; Gregory, Peggy; Taylor, Katie; AlQaisi, Raid (Journal article; Peer reviewed, 2019)
      Austerity and financial constraints have been threatening the public sector in the UK for a number of years. Foreseeing the threat of continued budget cuts, and addressing the situation many local councils face, requires ...
    • An experimental evaluation of bow-tie analysis for cybersecurity requirements 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Bow-tie analysis includes a graphical representation for depicting threats and consequences related to unwanted events, and shows how preventive and reactive barriers can provide control over such situations. This kind of ...
    • Monitor 2019 - En deskriptiv kartlegging av digital tilstand i norske skoler og barnehager 

      Fjørtoft, Siw Olsen; Thun, Sylvi; Buvik, Marte Pettersen (SINTEF rapport;2019:00877, Research report, 2019)
      Monitor 2019 er en kartlegging av digital tilstand i norske skoler og barnehager. Våre hovedfunn på skole er at den digitale praksisen er regulert ut ifra didaktiske vurderinger, læringsmål og alder på elevene. Elever og ...
    • A Secure MANET Routing Protocol for Crisis Situations 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Tøndel, Inger Anne (Journal article; Peer reviewed, 2018)
    • Parametric Shape Optimization for Combined Additive–Subtractive Manufacturing 

      Tamellini, Lorenzo; Chiumenti, Michele; Altenhofen, Christian; Attene, Marco; Barrowclough, Oliver Joseph David; Livesu, Marco; Marini, Federico; Martinelli, Massimiliano; Skytt, Vibeke (Journal article; Peer reviewed, 2019)
      In industrial practice, additive manufacturing (AM) processes are often followed by post-processing operations such as heat treatment, subtractive machining, milling, etc., to achieve the desired surface quality and ...
    • Data Handling in Knowledge Infrastructures: A Case Study from Oil Exploration 

      Mikalsen, Marius; Monteiro, Eric (Journal article; Peer reviewed, 2018)
      Offshore oil exploration is concerned with subsea geological reservoirs that are numerous kilometers below the seabed. These reservoirs are knowable only through a knowledge infrastructure of interconnected technologies ...
    • Designing privacy-friendly digital whiteboards for mediation of clinical progress 

      Gjære, Erlend Andreas; Lillebo, Børge (Journal article; Peer reviewed, 2014)
      Background: In hospitals, digital versions of dry-erase whiteboards are increasingly becoming more common. One of the purposes with such whiteboards is to support coordination of care by augmenting visibility and availability ...
    • Putting the "Account" into Cloud Accountability 

      Jaatun, Martin Gilje; Pearson, Siani (Proceedings of the 9th International Conference on Cloud Computing and Services Science;, Chapter; Peer reviewed, 2019)
      Security concerns are often cited as the most prominent reason for not using cloud computing, but customers of cloud users, especially end-users, frequently do not understand the need to control access to personal information. ...
    • Using 2D seismic line data to estimate impact of caprock morphology on CO2 migration in the Gassum formation 

      Andersen, Odd; Sundal, Anja (Conference object; Lecture, 2019)
      The Gassum Formation on the Norwegian Continental Shelf serves as the principal case study for the CO2-Upslope project. The top surface of this formation is gently sloping, and characterized by a number of macro-scale ...
    • Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects 

      Cruzes, Daniela Soares; Jaatun, Martin Gilje; Bernsmed, Karin; Tøndel, Inger Anne (Journal article; Peer reviewed, 2018)
      The goal of secure software engineering is to create software that keeps performing as intended even when exposed to attacks. Threat modeling is considered to be a key activity, but can be challenging to perform for ...
    • Dependency Management in Large-Scale Agile: A Case Study of DevOps Teams 

      Stray, Viktoria; Moe, Nils Brede; Aasheim, Andreas (Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS);, Chapter; Peer reviewed, 2019)
      Managing dependencies between teams and within teams is critical when running large-scale agile projects. In large-scale software development, work is carried out simultaneously by many developers and development teams. ...
    • A Perception of the Practice of Software Security and Performance Verification 

      Ribeiro, Victor Vidigal; Cruzes, Daniela Soares; Travassos, Guilherme Horta (Journal article; Peer reviewed, 2018)
      Security and performance are critical nonfunctional requirements for software systems. Thus, it is crucial to include verification activities during software development to identify defects related to such requirements, ...
    • A tunable, microfluidic filter for clog‑free concentration and separation of complex algal cells 

      Mossige, Endre Joachim; Edvardsen, Bente; Jensen, Atle; Mielnik, Michal Marek (Journal article; Peer reviewed, 2019)
      An inherent problem with microfluidic filters is the tendency to clog, especially when applied to cells due to their geometrical complexity, deformability, and tendency to adhere to surfaces. In this work, we handle live ...
    • Towards an understanding of scaling frameworks and business agility: a summary of the 6th international workshop at XP2018 

      Dingsøyr, Torgeir; Moe, Nils Brede; Ohlsson, Helena Holmström (Proceedings of the 19th International Conference on Agile Software Development;2018, Journal article; Peer reviewed, 2018)
      Large development projects and programs are conducted using agile development methods, with an increasing body of advice from practitioners and from research. This sixth workshop showed in increasing interest in scaling ...
    • Green growth – a synthesis of scientific findings 

      Capasso, Marco; Hansen, Teis; Heiberg, Jonas; Klitkou, Antje; Steen, Markus (Journal article; Peer reviewed, 2019)
      Governments in countries across the world increasingly adopt the “green growth” discourse to underline their ambition for the greening of their economies. The central tenet of this narrative is the economic opportunities ...
    • Do Software Firms Collaborate or Compete? A Model of Coopetition in Community-initiated OSS Projects 

      Nguyen Duc, Anh; Cruzes, Daniela Soares; Snarby, Terje; Abrahamsson, Pekka (Journal article; Peer reviewed, 2019)
      Background: An increasing number of commercial firms are participating in Open Source Software (OSS) projects to reduce their development cost and increase technical innovativeness. When collaborating with other firms whose ...