Browsing Institutt for informatikk by Title
Now showing items 920-939 of 4956
-
(Chapter / Bokkapittel / AcceptedVersion; Peer reviewed, 2018)We present ctrlTCP, a method to combine the congestion controls of multiple TCP connections. In contrast to the previous methods such as the Congestion Manager, ctrlTCP can couple all TCP flows that leave one sender, ...
-
(Master thesis / Masteroppgave, 2023)
-
(Master thesis / Group thesis / Masteroppgave / Gruppeoppgave, 2015)Learning how to use distributed business systems requires expensive and sustained training efforts, and this study addresses the need for sustainable and effective training solutions, and an approach to nurture local users ...
-
(Master thesis / Group thesis / Masteroppgave / Gruppeoppgave, 2015)Learning how to use distributed business systems requires expensive and sustained training efforts, and this study addresses the need for sustainable and effective training solutions, and an approach to nurture local users ...
-
(Master thesis / Masteroppgave, 2008)In this thesis the Norwegian Mobile Internet (NMI) is investigated. The critical approach, to my research, stems from a Habermasian concern for collective liberation through the cultivation of a (networked) public sphere, ...
-
(Master thesis / Masteroppgave, 2007)This study focuses on the challenges of building health workers capacity for understanding and using health data through training and support. The study falls under the action research paradigm in which health workers at ...
-
(Chapter / Bokkapittel / AcceptedVersion; Peer reviewed, 2008)
-
(Master thesis / Masteroppgave, 2015)This thesis presents a design companion created by taking key concepts from such games and combining them with state of the art gamification frameworks, the purpose of which is to create collaborative user experiences. The ...
-
(Master thesis / Masteroppgave, 2013)The cloud computing technology has recently gain allot of attention both in public and private sectors. The technology is expected to grow up dramatically in the next 3-5 years. The deployment of next generation clouds has ...
-
(Research report / Forskningsrapport, 1996)
-
(Master thesis / Hovedoppgave, 2002)The cost of arrays are often (more or less) proportional to the number of elements. Often there are also technical difficulties in fitting a high number of elements and cables on the surface of a transducer. It is therefore ...
-
(Journal article / Tidsskriftartikkel / PublishedVersion; Peer reviewed, 2009)Background High-density tiling microarrays are a powerful tool for the characterization of complete genomes. The two major computational challenges associated with custom-made arrays are design and analysis. Firstly, ...
-
(Master thesis / Masteroppgave, 2008)In this thesis I investigate how customers and developers interact through different forms of constellations in product development processes. This thesis is part of the KP-Lab project, more precisely part of the KIKK ...
-
(Doctoral thesis / Doktoravhandling, 2014)A consequence of globalization has been the increased use of generic software in multiple contexts. Customization is one of the activities adopted to make these systems to fit the local contexts. This activity is a non-trivial ...
-
(Master thesis / Masteroppgave, 2007)In this thesis, we have investigated how an open source web portal can be used in a business context. This investigation required development of components for a web portal to meet the company’s needs. The motivation for ...
-
(Research report / Forskningsrapport, 1995)
-
(Master thesis / Masteroppgave, 2021)
-
Cyber security in the vocational education programme electrical engineering and computer technology (Master thesis / Masteroppgave, 2022)This thesis focuses on the vocational education programme electrical engineering and computer technology at the upper secondary school level. The aim is to investigate if the pupils attending said course has any need for ...
-
(Chapter / Bokkapittel / AcceptedVersion; Peer reviewed, 2017)Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security operations in terms of detective ...
-
(Master thesis / Masteroppgave, 2020)