• Resolution of Interfering Product Fragments in Software Product Line Engineering 

      Vasilevskiy, Anatoly; Haugen, Øystein (Journal article; Peer reviewed, 2014)
      The Common Variability Language (CVL) allows deriving new products in a software product line by substituting fragments (placement) in the base model. Relations between elements of different placement fragments are an ...
    • Simulation-based validation of smart grids – Status quo and future research trends 

      Steinbrink, Cornelius; Lehnhoff, Sebastian; Rohjans, Sebastian; Strasser, Thomas I.; Widl, Edmund; Moyo, Cyndi; Lauss, Georg F.; Lehfuss, Felix; Faschang, Mario; Palensky, Peter P.; van der Meer, Arjen A.; Heussen, Kai; Gehrke, Oliver; Guillo-Sansano, E.; Syed, Mazzheruddin Hussain; Emhemed, Abdullah; Brandl, Ron; Nguyen, Van Hoa; Khavari, Ali M.; Tran, Quoc Tuan; Kotsampopoulos, Panos C.; Hatziargyriou, Nikos; Akroud, Nabil; Rikos, Evangelos J.; Degefa, Merkebu Zenebe (Journal article; Peer reviewed, 2017)
      Smart grid systems are characterized by high complexity due to interactions between a traditional passive network and active power electronic components, coupled using communication links. Additionally, automation and ...
    • Survival by Deception 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Sørensen, Jan Tore (Journal article; Peer reviewed, 2007)
      A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. ...
    • The InfraRisk ontology: enabling semantic interoperability for critical infrastructures at risk from natural hazards 

      Roman, Dumitru; Sukhobok, Dina; Nikolov, Nikolay; Elvesæter, Brian; Pultier, Antoine (Journal article; Peer reviewed, 2017)
      Earthquakes, landslides, and other natural hazard events have severe negative socio-economic impacts. Among other consequences, those events can cause damage to infrastructure networks such as roads and railways. Novel ...
    • The role of a political party website: Lessons learnt from the user perspective 

      Følstad, Asbjørn; Johannessen, Marius Rohde; Lüders, Marika (Journal article; Peer reviewed, 2014)
      Though substantial research efforts have been spent on understanding the role of political party websites, there is a lack of in-depth knowledge con-cerning how such webpages are experienced by their users. In this paper, ...
    • The Use of Digital Game Based Learning in Manufacturing Education - A Case Study 

      Perini, Stefano; Oliveira, Manuel Fradinho; Margoudi, Maria; Taisch, Marco (Journal article; Peer reviewed, 2018)
      The use of Digital Game-Based Learning (DGBL) in manufacturing education has been on the rise. However, empirical evidence of the educational effectiveness of DGBL is still scant, especially in manufacturing education. ...
    • Third International Workshop on Quality in Modeling 

      Sourrouille, Jean-Louis; Kuzniarz, Ludwik; Pareto, Lars; Mohagheghi, Parastoo; Staron, Miroslaw (Journal article; Peer reviewed, 2009)
      Software quality management is widely researched within Model Driven Software Development (MDD), from both industry practices and academic research viewpoints. The goal of this workshop was to gather researchers and ...
    • Towards a collective awareness platform for privacy concerns and expectations 

      Flouris, Giorgos; Patkos, Theodore; Chrysakis, Ioannis; Konstantinou, Ioulia; Nikolov, Nikolay; Papadakos, Panagiotis; Pitt, Jeremy; Roman, Dumitru; Stan, Alexandru; Zeginis, Chrysostomos (Journal article; Peer reviewed, 2018)
      In an increasingly instrumented and inter-connected digital world, citizens generate vast amounts of data, much of it being valuable and a significant part of it being personal. However, controlling who can collect it, ...
    • Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies 

      Tøndel, Inger Anne; Nyre, Åsmund Ahlmann (Journal article; Peer reviewed, 2012)
      Current approaches to privacy policy comparison use strict evaluation criteria (e.g. user preferences) and are unable to state how close a given policy is to fulfil these criteria. More flexible approaches for policy ...
    • Towards Transparent Real-Time Privacy Risk Assessment of Intelligent Transport Systems 

      Erdogan, Gencer; Omerovic, Aida; Natvig, Marit Kjøsnes; Tardy, Isabelle (Journal article; Peer reviewed, 2017)
      There are many privacy concerns within Intelligent Transport Systems (ITS). On the one hand, end-users are concerned about their privacy risk exposure, while on the other hand, ITS providers need to claim privacy awareness ...
    • Usability of visual data profiling in data cleaning and transformation 

      von Zernichow, Bjørn Marius; Roman, Dumitru (Journal article; Peer reviewed, 2017)
      This paper proposes an approach for using visual data profiling in tabular data cleaning and transformation processes. Visual data profiling is the statistical assessment of datasets to identify and visualize potential ...
    • Using critical incidents in workshops to inform eHealth design 

      Grunloh, Christiane; Hallewell Haslwanter, Jean D; Kane, Bridget; Lee, Eunji; Lind, Thomas; Moll, Jonas; Rexhepi, Hanife; Scandurra, Isabella (Journal article; Peer reviewed, 2017)
      Demands for technological solutions to address the variety of problems in healthcare have increased. The design of eHealth is challenging due to e.g. the complexity of the domain and the multitude of stakeholders involved. ...
    • Virtual Bodystorming: Utilizing Virtual Reality for Prototyping in Service Design 

      Boletsis, Costas; Karahasanovic, Amela; Fjuk, Annita (Chapter, 2017)
      The paper describes our ongoing work on a new prototyping method for service design, Virtual Bodystorming. Virtual Bodystorming utilizes Virtual Reality (VR) and enables the user to role-play the service scenario in a fully ...
    • Visualizing Cyber Security Risks with Bow-Tie Diagrams 

      Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan (Journal article; Peer reviewed, 2018)
      Safety and security risks are usually analyzed independently, by different people using different tools. Consequently, the system analyst may fail to realize cyber attacks as a contributing factor to safety impacts or, on ...
    • Visualizing Cyber Security Risks with Bow-Tie Diagrams 

      Bernsmed, Karin; Frøystad, Christian; Meland, Per Håkon; Nesheim, Dag Atle; Rødseth, Ørnulf Jan (Journal article; Peer reviewed, 2018-01-19)
      Safety and security risks are usually analyzed independently, by different people using different tools. Consequently, the system analyst may fail to realize cyber attacks as a contributing factor to safety impacts or, on ...
    • What is large in large-scale? a taxonomy of scale for agile software development 

      Dingsøyr, Torgeir; Fægri, Tor Erlend; Itkonen, Juha (Journal article; Peer reviewed, 2014)
      Positive experience of agile development methods in smaller projects has created interest in the applicability of such methods in larger scale projects. However, there is a lack of conceptual clarity regarding what large-scale ...
    • What Makes Users Trust a Chatbot for Customer Service? An Exploratory Interview Study 

      Følstad, Asbjørn; Nordheim, Cecilie Bertinussen; Bjørkli, Cato Alexander (Journal article; Peer reviewed, 2018)
      Chatbots are increasingly offered as an alternative source of customer service. For users to take up chatbots for this purpose, it is important that users trust chatbots to provide the required support. However, there is ...
    • Women and computer games (workshops and tutorials) - presentasjon av en konferanse 

      Jaccheri, Maria Letizia; Wang, Alf Inge; Ask, Kristine; Petersen, Sobah Abbas; Brend, Kristina (Journal article; Peer reviewed, 2017)
      This full day workshop welcomes contributions that enhance the state of the knowledge about the relation between women and computer games. Women have often been seen as consumers of computer games. The current land-scape ...