Blar i Department of Information and Communication Technology på tittel
Viser treff 1076-1095 av 1289
-
Software testing: A case study of a small Norwegian software team
(Master thesis, 2012)(Konfidensiell til/confidential until 01.07.2017) -
Solving dynamic bandit problems and decentralized games using the kalman bayesian learning automaton
(Master thesis, 2010)Multi-armed bandit problems have been subject to a lot of research in computer science because it captures the fundamental dilemma of exploration versus exploitation in reinforcement learning. The goal of a bandit problem ... -
Solving Multiconstraint Assignment Problems Using Learning Automata
(Journal article; Peer reviewed, 2010)This paper considers the NP-hard problem of object assignment with respect to multiple constraints: assigning a set of elements (or objects) into mutually exclusive classes (or groups), where the elements which are ... -
Solving Non-Stationary Bandit Problems by Random Sampling from Sibling Kalman Filters
(Lecture Notes in Computer Science ; 6098, Chapter; Peer reviewed, 2010)The multi-armed bandit problem is a classical optimization problem where an agent sequentially pulls one of multiple arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions ... -
Solving Stochastic Nonlinear Resource Allocation Problems Using a Hierarchy of Twofold Resource Allocation Automata.
(Journal article; Peer reviewed, 2010)In a multitude of real-world situations, resources must be allocated based on incomplete and noisy information. However, in many cases, incomplete and noisy information render traditional resource allocation techniques ... -
Solving Stochastic Root-Finding with adaptive d-ary search
(Chapter; Peer reviewed, 2015) -
Solving the boolean satisfiability problem using multilevel techniques
(Master thesis, 2011)There are many complex problems in computer science that occur in knowledge-representation (artificial thinking), artificial learning, Very Large Scale Integration (VLSI) design, security protocols and other areas. These ... -
Solving Two-Person Zero-Sum Stochastic Games With Incomplete Information Using Learning Automata With Artificial Barriers
(Journal article; Peer reviewed, 2021)Learning automata (LA) with artificially absorbing barriers was a completely new horizon of research in the 1980s (Oommen, 1986). These new machines yielded properties that were previously unknown. More recently, absorbing ... -
Sorterius - An augmented reality app for encouraging outdoor physical activity for people with intellectual disabilities
(Peer reviewed; Journal article, 2022)Many with intellectual disabilities (ID) have difficulties adhering to current physical activity guidelines. The goal of this study was to develop a mobile app for assisting people with ID to be more physically active. We ... -
Source Code Auto Completion with different approaches: Text Classification, N-Gram Models, Long Short-Term Memory
(Master thesis, 2022)Et gjennomgang av 2 ulike Source Code Auto Completion metoder med Text Classification og N-Gram Modeller. I tillegg et forsøk på implementasjon av Long Short-Term Memory for Auto Completion med Python. -
Space and depth-related enhancements of the history-ADS strategy in game playing
(Chapter; Peer reviewed, 2015) -
Spam classification for online discussions
(Master thesis, 2010)Traditionally, spam messages filtering systems are built by integrating content-based analysis technologies which are developed from the experiences of dealing with E-mail spam. Recently, the new style of information appears ... -
Sparse Online Learning with Kernels using Random Features for Estimating Nonlinear Dynamic Graphs
(Peer reviewed; Journal article, 2023)Online topology estimation of graph-connected time series is challenging in practice, particularly because the dependencies between the time series in many real-world scenarios are nonlinear. To address this challenge, we ... -
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
(Chapter; Peer reviewed, 2009)In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The ... -
Spatio-Temporal Anomaly Detection with Graph Networks for Data Quality Monitoring of the Hadron Calorimeter
(Peer reviewed; Journal article, 2023)The Compact Muon Solenoid (CMS) experiment is a general-purpose detector for high-energy collision at the Large Hadron Collider (LHC) at CERN. It employs an online data quality monitoring (DQM) system to promptly spot and ... -
Spectrogram Analysis of Non-Stationary RSE-to-Car Channels Behaviour for Braking Situations
(Master thesis, 2017)Car-to-car (C2C) and car-to-infrastructure (C2I) communications promise revolutionary improvements in transportation due to its possibilities to improve the road safety and tra c management. C2C is a system designed to ... -
Spectrum cartography techniques, challenges, opportunities, and applications: A survey
(Peer reviewed; Journal article, 2021)The spectrum cartography finds applications in several areas such as cognitive radios, spectrum aware communications, machine-type communications, Internet of Things, connected vehicles, wireless sensor networks, and radio ... -
Spectrum Cartography using Adaptive Multi-kernels – Experimental validation
(Master thesis, 2017) -
Spectrum cartography using adaptive radial basis functions: Experimental validation
(EEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC);18, Journal article; Peer reviewed, 2017)In this paper, we experimentally validate the functionality of a developed algorithm for spectrum cartography using adaptive Gaussian radial basis functions (RBF). The RBF are strategically centered around representative ... -
Sporing av kjøretøy med maskin-til-maskin kommunikasjon basert på GPS og GSM/GPRS
(Master thesis, 2003)Maskin-til-maskin (M2M) kommunikasjon mellom mobile, flyttbare eller stasjonære enheter er forventet å øke eksponentielt i de kommende årene. Mulighetene for M2M kommunikasjon er mange, enheter kan bli brukt til fjernkontroll, ...