Now showing items 774-793 of 1128

    • QoE Beyond the MOS: An In-Depth Look at QoE via Better Metrics and their Relation to MOS 

      Hossfelt, Tobias; Heegaard, Poul Einar; Varela, Martin; Möller, Sebastian (Journal article; Peer reviewed, 2016)
      While Quality of Experience (QoE) has advanced very significantly as a field in recent years, the methods used for analyzing it have not always kept pace. When QoE is studied, measured or estimated, practically all the ...
    • QoE - Defining a User-Centric Concept for Service Quality 

      Varela, Martin; Skorin-Kapov, Lea; De Moor, Katrien; Reichl, Peter (Chapter, 2016)
    • QoS performance of LTE networks with network coding 

      Assefa, Tewelde Degefa (Master thesis, 2015)
      Nowadays the widespread use of variety of smart phones and tablets with wide range of multimedia application support is driving more data service users towards full mobility causing a rapid increase in demand for mobile ...
    • Quality evaluation in spectral imaging – Quality factors and metrics 

      Shrestha, Raju; Pillay, Ruven; George, Sony; Hardeberg, Jon Yngve (Journal article, 2014)
      Spectral imaging has many advantages over conventional three channel colour imaging, and has numerous applications in many domains. Despite many benefits, applications, and different techniques being proposed, little ...
    • Quality of Experience of WebRTC based video communication 

      Fosser, Eirik; Nedberg, Lars Olav D (Master thesis, 2016)
      Online video applications are growing in popularity and using an increasing share of the consumer Internet traffic. Web Real-Time Communication (WebRTC) is a new technology which allows browser-to-browser communications ...
    • Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security 

      Wangen, Gaute; Shalaginov, Andrii (Chapter, 2016)
      Achieving the quantitative risk assessment has long been an elusive problem in information security, where the subjective and qualitative assessments dominate. This paper discusses the appropriateness of statistical and ...
    • Radio Access Technology Selection in Heterogeneous Wireless Networks for Revenue Maximization 

      Khloussy, Elissar (Doctoral theses at NTNU;2018:163, Doctoral thesis, 2018)
      Wireless networks have witnessed a great success recently. The number of users along with the traffic demands have grown exponentially. Therefore, the wireless resources of a single Radio Access Technology (RAT) might not ...
    • Rammeverk for formulering av portable krav til informasjonssikkerhet 

      Ween, Morten (Master thesis, 2005)
      NORSK: Når data skal utveksles i et nettverk, eller det skal gis delt tilgang til data fra forskjellige systemer tilknyttet nettverket, vil aktører i forskjellige deler av nettet håndtere og beskrive sikkerhetsspørsmål ...
    • Rate Adaptive Video Streaming over Wireless Networks: Explained & Explored 

      Haukaas, Torgeir (Master thesis, 2007)
      In the search for improved methods of transporting real time video and VoIP over the Internet, new rate control mechanisms need to be developed and standardized. Ongoing research in the field has led to several new protocol ...
    • Rate vulnerability reducing measures for home offices based on a cost effectiveness analysis 

      Lieungh, Steinar (Master thesis, 2005)
      NORSK: Stadig flere bedrifter tar i bruk hjemmekontorløsninger slik at de ansatte kan få muligheten til å jobbe hjemmefra, en eller flere dager i uken. Ved å flytte kontorene ut fra bedriften og hjem til de ansatte, ...
    • Reading the Electricity Meter 

      Aker, Ole-Magnus Røysted (Master thesis, 2014)
      The consumers in today's electricity market need to report their electricity consumption usually every third month, and occasionally even more often. The new paradigm in Norway's electricity system will be the use of smart ...
    • Realizing Distributed RSA using Secure Multiparty Computations 

      Mauland, Atle (Master thesis, 2009)
      This thesis describes the basic theory of multiparty computation (MPC) in addition to a fully functional distributed Rivest-Shamir-Adleman (RSA) protocol for three players implemented in Virtual Ideal Functionality Framework ...
    • Realizing Secure Multiparty Computations 

      Vegge, Håvard (Master thesis, 2009)
      In this thesis the Virtual Ideal Functionality Framework (VIFF) has been used for implementing practical applications based on multiparty computation (MPC). The work started with a theoretical study of secret sharing and ...
    • Real-time Communication in a Ubiquitous Office Environment 

      Randby, Johan Martin (Master thesis, 2008)
      Combining multiple fixed and mobile terminals to create a real-time communication session can be troublesome. Consider the following scenario: Alice is at work, and wants to place a video call to Tom, who is not currently ...
    • Real time detection and analysis of PDF-files 

      Borg, Knut (Master thesis, 2013)
      ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format being quite versatile. A PDF-file can be used as direct attacks against specific targets like the government, the army or ...
    • Real-Time End-User Service Composition Using Google Wave 

      Halvorsen, Espen Herseth (Master thesis, 2010)
      This thesis explores Wave, a brand new communication and collaboration platform, from the perspective of end user service composition. A description of the different frameworks that are available and a study of how these ...
    • REAL-TIME NETWORK INTRUSIONPREVENTION 

      Haslum, Kjetil (Doctoral Theses at NTNU, 1503-8181; 168, Doctoral thesis, 2010)
      It is not economically or technically feasible to make complex computersystems that are completely secure. New attacks are constantly developedby attackers and the security situation can therefore rapidly change. In orderto ...
    • REAL-TIME NETWORK INTRUSIONPREVENTION 

      Haslum, Kjetil (Doctoral Theses at NTNU, 1503-8181; 168, Doctoral thesis, 2010)
      It is not economically or technically feasible to make complex computersystems that are completely secure. New attacks are constantly developedby attackers and the security situation can therefore rapidly change. In orderto ...
    • Real-time people counting system using a single video camera 

      Lefloch, Damien; Cheikh, Faouzi Alaya; Hardeberg, Jon Yngve; Gouton, Pierre; Picot-Clemente, Romain (Proceedings of SPIE;6811, Journal article; Peer reviewed, 2008)
      There is growing interest in video-based solutions for people monitoring and counting in business and security applications. Compared to classic sensor-based solutions the video-based ones allow for more versatile ...
    • Reasoning-based Capability Configuration Management in Adaptable Service Systems 

      Supadulchai, Paramai (Doktoravhandlinger ved NTNU, 1503-8181; 2008:10, Doctoral thesis, 2008)
      Networked Service Systems are considered. Services are realized by service components, which by their inter-working, provide a service in the role of a service provider to service users. During more than two decades, ...