Type
Now showing items 120 of 83

4th Nordic Workshop on Cosmogenic Nuclides. Landscape development and geohazards
(The University of Bergen and the World Heritage Foundation Geirangerfjord, 2018)Conference object 
An Approach for Investigation of Geochemical RockFluid Interactions
(Stanford University, 2014)Geochemistry has a substantial impact in exploiting of geothermal systems. When water is injected in a geothermal reservoir, the injected water and insitu brine have different temperatures and chemical compositions and ...Conference object 
Approximating Acyclicity Parameters of Sparse Hypergraphs
(Dagstuhl Publishing, 2009)The notions of hypertree width and generalized hypertree width were introduced by Gottlob, Leone, and Scarcello (PODS'99, PODS'01) in order to extend the concept of hypergraph acyclicity. These notions were further generalized ...Conference object 
Bchromatic number: Beyond NPhardness
(Dagstuhl Publishing, 2015)The bchromatic number of a graph G, chi_b(G), is the largest integer k such that G has a kvertex coloring with the property that each color class has a vertex which is adjacent to at least one vertex in each of the other ...Conference object 
Co2 trapping in sloping aquafiers: High resolution numerical simulations
(CIMNE, 2010)Conference object 
Colluding Tags Attack on the ECCbased Grouping Proofs for Rfids
(The author, 2012)Recently, a new privacypreserving elliptic curve based grouping proof protocol with colluding tag prevention( CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which ...Conference object 
Community Detection on the GPU
(IEEE, 2017)We present and evaluate a new GPU algorithm based on the Louvain method for community detection. Our algorithm is the first for this problem that parallelizes the access to individual edges. In this way we can fine tune ...Conference object 
A Comparative Analysis of Feature Selection Methods for Biomarker Discovery in Study of ToxicantTreated Atlantic Cod (Gadus Morhua) Liver
(Springer, 2019)Univariate and multivariate feature selection methods can be used for biomarker discovery in analysis of toxicant exposure. Among the univariate methods, differential expression analysis (DEA) is often applied for its ...Conference object 
Computing cutwidth and pathwidth of semicomplete digraphs via degree orderings
(Dagstuhl Publishing, 2013)The notions of cutwidth and pathwidth of digraphs play a central role in the containment theory for tournaments, or more generally semicomplete digraphs, developed in a recent series of papers by Chudnovsky, Fradkin, Kim, ...Conference object 
Connecting Vertices by Independent Trees
(Schloss Dagstuhl – LeibnizZentrum für Informatik GmbH, 2014)We study the paramereteized complexity of the following connectivity problem. For a vertex subset U of a graph G, trees T1, . . . , Ts of G are completely independent spanning trees of U if each of them contains U , and ...Conference object 
Coring of unconsolidated permafrost deposits: methodological successes and challenges
(GEOQuébec2015, 2015)This technical note presents three scales of drilling infrastructure for comparison. These three methods include: (1) a small handdrill designed for retrieving cores down to ca. 5 m depth, (2) the mediumscale UNIS ...Conference object 
Cosmic Ray Signatures from Decaying Gravitino Dark Matter
(Scuola Internazionale Superiore di Studi Avanzati, 2009)We study the charged cosmic rays arising from the slow decay of gravitino dark matter within supersymmetric scenarios with trilinear Rparity violation. It is shown that operators of the LLE type can very well account ...Conference object 
Counting Instances of Software Components
(University of Bergen, Department of Informatics, 20040713)Component software is software that has been assembled from various pieces of standardized, reusable computer programs, socalled components. Executing component software creates instances of these components. For several ...Conference object 
CP Violation in the scalar sector
(Proceedings of Science, 2016)Models with an extended scalar sector may in principle provide new sources of CP violation originating in the scalar potential. One of the simplest ways to implement this idea is to have CP violation in a twoHiggsdoublet ...Conference object 
Direct data transfer between SOAP web services in Orchestration
(ACM, 2012)In scientific data analysis, workflows are used to integrate and coordinate resources such as databases and tools. Workflows are normally executed by an orchestrator that invokes component services and mediates data ...Conference object 
Domain decomposition preconditioning for nonlinear elasticity problems
(International Centre for Numerical Methods in Engineering, 2014)We consider domain decomposition techniques for a nonlinear elasticity problem. Our main focus is on nonlinear preconditioning, realized in the framework of additive Schwarz preconditioned inexact Newton (ASPIN) methods. ...Conference object 
Editing to Eulerian Graphs
(Schloss Dagstuhl – LeibnizZentrum für Informatik GmbH, 2014)We investigate the problem of modifying a graph into a connected graph in which the degree of each vertex satisfies a prescribed parity constraint. Let ea, ed and vd denote the operations edge addition, edge deletion and ...Conference object 
Electrical conductivity of fractured media: A computational study of the selfconsistent method
(Society of Exploration Geophysicists, 2012)Effective medium theory can be used to link conductivity estimation methods with prior knowledge about the distribution of fractures in the investigated geological structure. In the literature, little work has been ...Conference object 

Enumerating minimal connected dominating sets in graphs of bounded chordality
(Dagstuhl Publishing, 2015)Listing, generating or enumerating objects of specified type is one of the principal tasks in algorithmics. In graph algorithms one often enumerates vertex subsets satisfying a certain property. We study the enumeration ...Conference object