• A hybrid approach for solving real-world nurse rostering problems 

      Stølevik, Martin; Nordlander, Tomas; Frøyseth, Helle; Riise, Atle (Journal article; Peer reviewed, 2011)
      Nurse rostering is the process of creating a plan for nurse working hours over a given time horizon. This problem, most variants of which are NP-hard, has been studied extensively for many years. Still, practical nurse ...
    • A Method for Developing Qualitative Security Risk Assessment Algorithms 

      Erdogan, Gencer; Refsdal, Atle (Journal article; Peer reviewed, 2018)
      We present a method for developing qualitative security risk assessment algorithms where the input captures the dynamic state of the target of analysis. This facilitates continuous monitoring. The intended users of the ...
    • A Study of Information Security Practice in a Critical Infrastructure Application 

      Jaatun, Martin Gilje; Albrechtsen, Eirik; Bartnes, Maria; Johnsen, Stig Ole; Wærø, Irene; Longva, Odd Helge; Tøndel, Inger Anne (Journal article; Peer reviewed, 2008)
      Based on multiple methods we have studied how information security practices, and in particular computer security incident response practices, are handled in the Norwegian offshore oil and gas industry. Our findings show ...
    • A Taxonomy for Combining Activity Recognition and Process Discovery in Industrial Environments 

      Mannhardt, Felix; Bovo, Riccardo; Oliveira, Manuel Fradinho; Julier, Simon (Journal article; Peer reviewed, 2018)
      Despite the increasing automation levels in an Industry 4.0 scenario, the tacit knowledge of highly skilled manufacturing workers remains of strategic importance. Retaining this knowledge by formally capturing it is a ...
    • An experimental evaluation of bow-tie analysis for cybersecurity requirements 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Bow-tie analysis includes a graphical representation for depicting threats and consequences related to unwanted events, and shows how preventive and reactive barriers can provide control over such situations. This kind of ...
    • Artificial Intelligence in the Public Sector: A Study of Challenges and Opportunities for Norwegian Municipalities 

      Mikalef, Patrick; Fjørtoft, Siw Olsen; Torvatn, Hans Yngvar (Journal article; Peer reviewed, 2019)
      The value of Artificial Intelligence (AI) in augmenting or even replacing human decision-making in the organizational context is gaining momentum in the last few years. A growing number of organizations are now experimenting ...
    • Automatic Myocardial Strain Imaging in Echocardiography Using Deep Learning 

      Østvik, Andreas; Smistad, Erik; Espeland, Torvald; Berg, Erik Andreas Rye; Løvstakken, Lasse (Journal article; Peer reviewed, 2018)
      Recent studies in the field of deep learning suggest that motion estimation can be treated as a learnable problem. In this paper we propose a pipeline for functional imaging in echocardiography consisting of four central ...
    • BVR - Better Variability Results 

      Haugen, Øystein; Øgård, Ommund (Journal article; Peer reviewed, 2014)
      We present BVR (Base Variability Resolution models), a language developed to fulfill the industrial needs in the safety domain for variability modeling. We show how the industrial needs are in fact quite general and that ...
    • Chatbots as Part of Digital Government Service Provision – A User Perspective 

      Abbas, Nadia; Følstad, Asbjørn; Bjørkli, Cato (Chapter, 2023)
      Chatbots are taken up as part of digital government service provision. While the success of chatbots for this purpose depends on these being accepted by their intended users, there is a lack of knowledge concerning user ...
    • Co-designing a mHealth Application for Self-management of Cystic Fibrosis 

      Vilarinho, Thomas; Floch, Jacqueline; Stav, Erlend (Journal article; Peer reviewed, 2017)
      Self-management has the potential to improve patient care and decrease healthcare costs. It is especially beneficial for patients suffering from chronic diseases that require continuous therapy and follow-up such as cystic ...
    • Comprehending Feature Models Expressed in CVL 

      Reinhartz-Berger, Iris; Figl, Kathrin; Haugen, Øystein (Journal article; Peer reviewed, 2014)
      Feature modeling is a common way to present and manage variability of software and systems. As a prerequisite for effective variability management is comprehensible representation, the main aim of this paper is to investigate ...
    • Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements? 

      Duncan, Bob; Whittington, Mark; Jaatun, Martin Gilje; Reyes, Alfredo (Journal article; Peer reviewed, 2017)
      In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to ...
    • Data preparation as a service based on Apache Spark 

      Mahasivam, Nivethika; Nikolov, Nikolay; Sukhobok, Dina; Roman, Dumitru (Journal article; Peer reviewed, 2017)
      Data preparation is the process of collecting, cleaning and consolidating raw datasets into cleaned data of certain quality. It is an important aspect in almost every data analysis process, and yet it remains tedious and ...
    • Defining the initial case-base for a CBR operator support system in digital finishing A methodological knowledge acquisition approach 

      Wienhofen, Leendert Wilhelmus Marinus; Mathisen, Bjørn Magnus (Journal article; Peer reviewed, 2016)
      Case-based reasoning (CBR) literature defines the process of defining a case-base as a hard and time-demanding task though the same literature does not report in detail on how to build your initial case base. The main ...
    • Describing Component Collaboration Using Goal Sequences 

      Carrez, Cyril; Floch, Jacqueline; Sanders, Richard (Journal article; Peer reviewed, 2008)
    • Design decisions in the development of a graphical language for risk-driven security testing 

      Erdogan, Gencer; Stølen, Ketil (Journal article; Peer reviewed, 2017)
      We have developed a domain-specific modeling language named CORAL that employs risk assessment to help security testers select and design test cases based on the available risk picture. In this paper, we present CORAL and ...
    • Designing a digital social innovation platform: From case studies to concepts 

      Dinant, Ines; Floch, Jacqueline; Vilarinho, Thomas; Oliveira, Manuel Fradinho (Journal article; Peer reviewed, 2017)
      Governments in the western countries are faced with a number of growing social challenges, such as unemployment, migration, ageing population, explosion of chronic disease. Although they offer a wide range of public social ...
    • Discovering Thermoelectric Materials Using Machine Learning: Insights and Challenges 

      Tabib, Mandar; Løvvik, Ole Martin; Johannessen, Kjetil Andre; Rasheed, Adil; Sagvolden, Espen; Rustad, Anne Marthine (Journal article; Peer reviewed, 2018)
      This work involves the use of combined forces of data-driven machine learning models and high fidelity density functional theory for the identification of new potential thermoelectric materials. The traditional method of ...
    • Effects of prior experience, gender, and age on trust in a banking chatbot with(out) breakdown and repair 

      Law, Effie Lai-Chong; van As, Nena; Følstad, Asbjørn (Chapter, 2023)
      Trust is an attitudinal construct that can be sensitive to prior experience, gender, and age. In our study, we explored how trust in a banking chatbot might be shaped by these user characteristics. Statistical analysis of ...
    • Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach 

      Černivec, Aleš; Erdogan, Gencer; Gonzalez, Alejandra; Refsdal, Atle; Romero, Antonio Alvarez (Journal article; Peer reviewed, 2018)
      We present a method for developing machine-readable cyber-risk assessment algorithms based on graphical risk models, along with a framework that can automatically collect the input, execute the algorithms, and present the ...