Recent Submissions

  • Risk in the Age of Software Security 

    Jaatun, Martin Gilje (Others, 2017)
    For general applications, it is way too costly to aim for 100 % secure software; for complex systems it may even be impossible. To achieve effective software security at reasonable cost, it is thus necessary to identify ...
  • Accountability Requirements in the Cloud Provider Chain 

    Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Journal article; Peer reviewed, 2018-04)
    In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ...
  • Frå transistor til datamaskin 

    Tengesdal, Morten (Notater fra Universitetet i Stavanger;39, Report, 2018-04)
    Dette skrivet prøver å gi ei forståing av korleis datamaskinar er oppbygde og virkar. Ein ser også på korleis ein kan programmera mindre datamaskinar brukte til styring og overvaking av prosessar. Skrivet er laga for bruk ...
  • Machine learning techniques for the detection of shockable rhythms in automated external defibrillators 

    Figuera, Carlos; Irusta, Unai; Morgado, Eduardo; Aramendi, Elisabete; Ayala, Unai; Wik, Lars; Kramer-Johansen, Jo; Eftestøl, Trygve; Alonso-Atienza, Felipe (Journal article; Peer reviewed, 2016-07)
    Early recognition of ventricular fibrillation (VF) and electrical therapy are key for the survival of out-of-hospital cardiac arrest (OHCA) patients treated with automated external defibrillators (AED). AED algorithms for ...
  • A secure user authentication protocol for sensor network in data capturing 

    Quan, Zhou; Chumning, Tan; Chunming, Rong; Xianghan, Zhen (Journal article; Peer reviewed, 2015-04)
    Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible ...
  • A risk assessment model for selecting cloud service providers 

    Cayirci, Erdal; Garaga, Alexandr; Santana de Oliveira, Anderson; Roudier, Yves (Journal article; Peer reviewed, 2016-09)
    The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service provider. It evaluates background information obtained from cloud ...
  • Revisiting Petri Net Modeling of the Cigarette Smokers' Problem: A GPenSIM Approach 

    Davidrajuh, Reggie (Conference object; Peer reviewed, 2013-11)
    Petri Nets is a family of modeling formalisms, with different interpretations and abstraction levels; the Petri nets family of modeling formalisms includes ordinary Petri Net, generalized Petri Net, and also all other ...
  • Activity-Oriented Petri Net for scheduling of resources 

    Davidrajuh, Reggie (Conference object, 2012-10)
    This work presents a new methodology for modeling discrete systems in which activities compete for resources. The new methodology known as Activity-Oriented Petri Net (AOPN) allows modelers to concentrate on modeling ...
  • Distributed workflow based approach for eliminating redundancy in virtual enterprising 

    Davidrajuh, Reggie (Journal article; Peer reviewed, 2013-01)
    The existence of redundancy is a serious problem in virtual enterprise in which a number of collaborating enterprises join together to manufacture and sell a class of product for a time-limited period. This paper proposes ...
  • Rhythm analysis during cardiopulmonary resuscitation: past, present, and future 

    Ruiz de Gauna, Sofia; Irusta, Unai; Ruiz, Jesus; Ayala, Unai; Aramendi, Elisabete; Eftestøl, Trygve (Journal article; Peer reviewed, 2014-01)
    Survival from out-of-hospital cardiac arrest depends largely on two factors: early cardiopulmonary resuscitation (CPR) and early defibrillation. CPRmust be interrupted for a reliable automated rhythmanalysis because chest ...
  • Defining angular and radial positions and parameters for myocardial pixels in cardiac MR images 

    Engan, Kjersti; Woie, Leik; Eftestøl, Trygve (Journal article; Peer reviewed, 2014)
    In this work we aimed to automatically produce a measure for the angular and radial position of all pixels within the myocardium in CMR images, left ventricle, short axis view. A reference axis is chosen in an anatomically ...
  • Classifying dementia using local binary patterns from different regions in magnetic resonance images 

    Oppedal, Ketil; Eftestøl, Trygve; Engan, Kjersti; Beyer, Mona K.; Aarsland, Dag (Journal article; Peer reviewed, 2015)
    Dementia is an evolving challenge in society, and no disease-modifying treatment exists. Diagnosis can be demanding and MR imaging may aid as a noninvasive method to increase prediction accuracy. We explored the use of ...
  • Chest compressions: The good, the bad and the ugly 

    Eftestøl, Trygve (Journal article, 2012)
    Where exactly is the chest compression, where does it begin, when does it end, how deep does it go and at what rate are they performed? In short – how good or bad is the chest compression? These are some of the questions ...
  • Structures for stepwise development of adaptive supply chain 

    Davidrajuh, Reggie (Journal article; Peer reviewed, 2006-12)
    Falling margins, globalization, and accelerating innova-tion cycles are forcing businesses to switch from traditional (linear and sequential) supply chains to adaptive supply chains that possess the flexibility needed ...
  • Probability mapping of scarred myocardium using texture and intensity features in CMR images 

    Kotu, Lasya Priya; Engan, Kjersti; Skretting, Karl; Måløy, Frode; Ørn, Stein; Woie, Leik; Eftestøl, Trygve (Journal article, 2013)
  • Java Bluetooth wireless technology for evaluating student performance in classroom 

    Davidrajuh, Reggie (Journal article; Peer reviewed, 2005)
    This paper focuses on the use of Java Bluetooth wireless technology for evaluation of student performance in classroom. First, an introduction to Bluetooth wireless technology is given. Second, use of Java technology for ...
  • Exploring ethical implications of personal relationships in dyadic business exchanges 

    Davidrajuh, Reggie (Journal article; Peer reviewed, 2007)
    This paper explores the ethical implications of the existence of personal relationships in business exchanges. Firstly, this paper introduces personal relationship in business exchanges. Secondly, three normative theories ...
  • Is Norway an information society? 

    Davidrajuh, Reggie (Conference object, 2010)
    Information Society can be loosely defined as a society integrated by complex communication networks that rapidly develop and exchange information. Information society is becoming an earthly phenomenon and the goal of every ...
  • An interative approach for distribution chain design in agile virtual environment 

    Hongze, Ma; Davidrajuh, Reggie (Journal article; Peer reviewed, 2005)
    Purpose – The study sets out to explore the use of an iterative approach for designing distribution chain in an agile virtual environment; in an agile virtual environment, quick adaptation to changing market situation ...
  • Representing Resources in Petri Net Models: Hardwiring or Soft-coding? 

    Davidrajuh, Reggie (Conference object, 2011)
    This paper presents an interesting design problem in developing a new tool for discrete-event dynamic systems (DEDS). A new tool known as GPenSIM was developed for modeling and simulation of DEDS; GPenSIM is based on Petri ...

View more