Blar i Publikasjoner fra CRIStin - SINTEF AS på tittel
Viser treff 71-90 av 5673
-
A hybrid approach for solving real-world nurse rostering problems
(Journal article; Peer reviewed, 2011)Nurse rostering is the process of creating a plan for nurse working hours over a given time horizon. This problem, most variants of which are NP-hard, has been studied extensively for many years. Still, practical nurse ... -
A Lightweight Approach to Secure Software Engineering
(Chapter, 2011)Secure software engineering is much more than developing critical software. History has shown us that software bugs and design flaws also represent exploitable security vulnerabilities in seemingly innocuous applications ... -
A lightweight protocol suite for underwater communication
(Chapter, 2009)A lightweight MAC and network layer protocol suite for underwater acoustic communication has been developed. The protocol suite covers the MAC layer, hop-by-hop acknowledgement, multi-hop routing and transmission and ... -
A Lower Bound for the Node, Edge, and Arc Routing Problem
(Journal article; Peer reviewed, 2013)The Node, Edge, and Arc Routing Problem (NEARP) was defined by Prins and Bouchenoua in 2004, although similar problems have been studied before. This problem, also called the Mixed Capacitated General Routing Problem ... -
A Lower Bound for the Node, Edge, and ArcRouting Problem
(Research report, 2011)The Node, Edge, and Arc Routing Problem (NEARP) was defined by Prins and Bouchenoua in 2004. They also proposed a memetic algorithm procedure and defined a set of test instances: the so-called CBMix benchmark. The NEARP ... -
A mathematical model for the nurse rostering system
(Research report, 2011)The model we present in this report is mainly developed on work done together with the company Gatsoft AS. With minor changes and extensions, a version of the model has been implemented and delivered to Gatsoft as a plug-in ... -
A mechanical and environmental assessment and comparison of basalt fibre reinforced polymer (BFRP) rebar and steel rebar in concrete beams
(Journal article; Peer reviewed, 2017)This paper compares holistically the mechanical and environmental performance of basalt fibre reinforced polymer (BFRP) rebar against conventional steel rebar in concrete beams. This assessment involves material testing ... -
A metamodel and supporting process and tool for specifying quality models in model-based software development
(Journal article; Peer reviewed, 2008) -
A Metamodel for Specifying Quality Models in Model-Driven Engineering
(Chapter, 2008)In the context of model-driven engineering, models act as the primary artifacts and are eventually transformed into other artifacts, such as code and documentation. Consequently, to evaluate and assure the quality of ... -
A Metamodel for Specifying Quality Models in Model-Driven Engineering
(Lecture, 2008)In the context of model-driven engineering, models act as the primary artifacts and are eventually transformed into other artifacts, such as code and documentation. Consequently, to evaluate and assure the quality of ... -
A method for determining material's equivalent stress-strain curve with any axisymmetric notched tensile specimens without Bridgman correction
(Journal article; Peer reviewed, 2018) -
A Method for Developing Algorithms for Assessing Cyber-Risk Cost
(Chapter, 2017)We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available ... -
A Method for Developing Qualitative Security Risk Assessment Algorithms
(Journal article; Peer reviewed, 2018)We present a method for developing qualitative security risk assessment algorithms where the input captures the dynamic state of the target of analysis. This facilitates continuous monitoring. The intended users of the ... -
A Method for Model-Driven Information Flow Security
(Research report, 2009)We present a method for software development in which information flow security is taken into consideration from start to finish. Initially, the user of the method (i.e., a software developer) specifies the ... -
A Methodical Quantification of Needle Visibility and Echogenicity in Ultrasound Images
(Journal article; Peer reviewed, 2019)During ultrasound-guided percutaneous interventions, needle localization can be a challenge. To increase needle visibility, enhancements of both the imaging methods and the needle surface properties have been investigated. ... -
A methodology to improve the performance of PV integrated shading devices using multi-objective optimization
(Journal article; Peer reviewed, 2019)Solar energy can be exploited efficiently in building façades using building integrated photovoltaics (BIPV). This study presents a methodology to optimize the design of fixed, parametrically modelled PV integrated shading ... -
A miniaturized pressure sensor with inherent biofouling protection designed for in vivo applications
(Journal article; Peer reviewed, 2011)The design, fabrication, and measurement results for a diaphragm-based single crystal silicon sensor element of size 820 µm × 820 µm × 500 µm are presented. The sensor element is designed for in vivo applications with ... -
A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain
(Chapter, 2016)Accidents on petroleum installations can have huge consequences; to mitigate the risk, a number of safety barriers are devised. Faults and unexpected events may cause barriers to temporarily deviate from their nominal ... -
A Model-Driven Approach to Interoperability in B2B Data Exchange
(Chapter, 2011)With the B2B data exchange becoming ubiquitous nowadays, automating as much as possible the exchange of data between collaborative enterprise systems is a key requirement for ensuring agile interoperability and scalability ... -
A modular approach to the modelling and analysis of risk scenarios with mutual depenencies
(Research report, 2008)This report describes a modular approach to the modelling and analysis of risk scenarios with mutual dependencies. The presented approach may be used to deduce the risk-level of an overall system from previous risk analyses ...