Harald Øverby
Spesialrådgiver
Utdanning
Spesialrådgiver
Utdanning
Lønsethagen, Håkon; Lange, Stanislav, Zinner, Thomas, Øverby, Harald, Contreras, Luis M., Ciulli, Nicola & Dotaro, Emmanuel (2023)
IEEE Communications Magazine, 61(11) , s. 184-190. Doi: https://doi.org/10.1109/MCOM.006.00210 - Fulltekst i vitenarkiv
The visions of 5G and Beyond (B5G) imply unprecedented expectations toward high-performing connectivity services in both public and private networks. Connectivity services that offer performance guarantees along multiple Quality of Service (QoS) dimensions are partially available today, but are confined to (virtual) private network services. However, open and equal access to public and Internet-scale Specialized Connectivity Services (SCS) delivered on-demand does not exist. This is especially true for interconnections across networks and support for mixed traffic modes that go beyond traditional best-effort. In this article, we argue that this is a huge industrial and societal problem that needs a solution. However, this problem is highly complex and multi-faceted, and there are many reasons why we are essentially locked into the status quo. We identify the stumbling blocks and propose a set of solution elements to take us across these hurdles, alongside related research topics. This includes an approach to “Multi-Level Best-Effort (MLBE)” and suggestions for evolving net neutrality regulation. Models and simulations show how a mixed traffic mode approach provides anticipated benefits, and we provide arguments why the context brought by B5G will put us into conditions for change, allowing public SCS eventually at a global scale.
Lønsethagen, Håkon; Lange, Stanislav, Zinner, Thomas, Øverby, Harald, Contreras, Luis M., Ciulli, Nicola & Dotaro, Emmanuel (2023)
IEEE Communications Magazine, 61(11) , s. 184-190. Doi: https://doi.org/10.1109/MCOM.006.00210 - Fulltekst i vitenarkiv
The visions of 5G and Beyond (B5G) imply unprecedented expectations toward high-performing connectivity services in both public and private networks. Connectivity services that offer performance guarantees along multiple Quality of Service (QoS) dimensions are partially available today, but are confined to (virtual) private network services. However, open and equal access to public and Internet-scale Specialized Connectivity Services (SCS) delivered on-demand does not exist. This is especially true for interconnections across networks and support for mixed traffic modes that go beyond traditional best-effort. In this article, we argue that this is a huge industrial and societal problem that needs a solution. However, this problem is highly complex and multi-faceted, and there are many reasons why we are essentially locked into the status quo. We identify the stumbling blocks and propose a set of solution elements to take us across these hurdles, alongside related research topics. This includes an approach to “Multi-Level Best-Effort (MLBE)” and suggestions for evolving net neutrality regulation. Models and simulations show how a mixed traffic mode approach provides anticipated benefits, and we provide arguments why the context brought by B5G will put us into conditions for change, allowing public SCS eventually at a global scale.
Kianpour, Mazaher; Kowalski, Stewart James & Øverby, Harald (2022)
Simulation modelling practice and theory, Doi: https://doi.org/10.1016/j.simpat.2022.102493 - Fulltekst i vitenarkiv
This paper presents an agent-based model of cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information societies in the world. Various doctrines and thesis explore how this domain should be treated by the public and private stakeholders. One of these doctrines is cybersecurity as a public good. In this paper, we highlight divergent views about the type of cybersecurity as an economic good. Then, the paper proposes an agent-based simulation model of a repeated public goods game among a set of defenders that are in an uncertain environment with incomplete and imperfect information. In the model, defenders have a probability to choose contribution or being a free-rider, depending on their own preferences and facing with revealed preferences of other defenders. This model implements a utility maximization that applies to each individual, modeling the existence of free-riders, punishments, and interdependency of decisions under a polycentric governance structure. The results of this simulation model show that, over time, defenders update their preferences in reaction to the behavior of other defenders and the experience of cyber-attacks. They indicate a high level of contribution to the provision of cybersecurity as a public good and the effectiveness of decentralized punishment on increasing the contributions. The consistency of the pattern of our results across different empirical studies lends us some reassurance that our model behavior is in quantitative agreement with empirical macro-structures. Furthermore, implementation of a polycentric structure challenges all the relevant agents to take action, and provides more robust environment.
Øverby, Harald; Audestad, Jan Arild & Szalkowski, Gabriel (2022)
Telecommunications Policy, 47(1) Doi: https://doi.org/10.1016/j.telpol.2022.102441 - Fulltekst i vitenarkiv
Compartmental models are widely used in epidemiology, engineering, and physics to describe the temporal behavior of complex systems. This paper presents how compartmental models may be applied to the digital economy—more specifically, how the Bass model can be extended to more complex economics systems such as markets with customer churning, competition, multisided platforms, and online games. It is demonstrated that it is straightforward to establish the equations describing the various economic systems under study, however, the equations are often too complex to be solved analytically in the general case. Though the paper presents simple and idealized cases, the solutions may, nevertheless, uncover important strategic aspects that otherwise may be hidden by complexity in the general case, for example, the reasons for slow initial market growth. The paper also discusses how the developed models may be used to evaluate digital economic market evolution and business policy.
Kianpour, Mazaher; Kowalski, Stewart James & Øverby, Harald (2022)
Simulation modelling practice and theory, Doi: https://doi.org/10.1016/j.simpat.2022.102493 - Fulltekst i vitenarkiv
This paper presents an agent-based model of cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information societies in the world. Various doctrines and thesis explore how this domain should be treated by the public and private stakeholders. One of these doctrines is cybersecurity as a public good. In this paper, we highlight divergent views about the type of cybersecurity as an economic good. Then, the paper proposes an agent-based simulation model of a repeated public goods game among a set of defenders that are in an uncertain environment with incomplete and imperfect information. In the model, defenders have a probability to choose contribution or being a free-rider, depending on their own preferences and facing with revealed preferences of other defenders. This model implements a utility maximization that applies to each individual, modeling the existence of free-riders, punishments, and interdependency of decisions under a polycentric governance structure. The results of this simulation model show that, over time, defenders update their preferences in reaction to the behavior of other defenders and the experience of cyber-attacks. They indicate a high level of contribution to the provision of cybersecurity as a public good and the effectiveness of decentralized punishment on increasing the contributions. The consistency of the pattern of our results across different empirical studies lends us some reassurance that our model behavior is in quantitative agreement with empirical macro-structures. Furthermore, implementation of a polycentric structure challenges all the relevant agents to take action, and provides more robust environment.
Øverby, Harald; Audestad, Jan Arild & Szalkowski, Gabriel (2022)
Telecommunications Policy, 47(1) Doi: https://doi.org/10.1016/j.telpol.2022.102441 - Fulltekst i vitenarkiv
Compartmental models are widely used in epidemiology, engineering, and physics to describe the temporal behavior of complex systems. This paper presents how compartmental models may be applied to the digital economy—more specifically, how the Bass model can be extended to more complex economics systems such as markets with customer churning, competition, multisided platforms, and online games. It is demonstrated that it is straightforward to establish the equations describing the various economic systems under study, however, the equations are often too complex to be solved analytically in the general case. Though the paper presents simple and idealized cases, the solutions may, nevertheless, uncover important strategic aspects that otherwise may be hidden by complexity in the general case, for example, the reasons for slow initial market growth. The paper also discusses how the developed models may be used to evaluate digital economic market evolution and business policy.
Kianpour, Mazaher; Kowalski, Stewart James & Øverby, Harald (2021)
CEUR Workshop Proceedings, 3016, s. 46-65. - Fulltekst i vitenarkiv
In cybersecurity economics, the selection of a particular methodology is a matter of interest and importance for the researchers. Methodologically sophisticated research forms an essential basis for understanding the challenges and opportunities for the richer descriptions of the behavior of cybersecurity practitioners (i.e., what they are doing and why they are doing it). This requires a broad and self-reflective approach to understand the use of a technique in socio-technical research within cybersecurity economics. Such understanding recognizes that research in this field involves more than just applying a method to create knowledge and diffuse it throughout society, organizations, and governments. This paper argues in favor of a multi-paradigmatic approach to cybersecurity economics research. Rather than adopting a single paradigm, this study suggests that results will be more prosperous and reliable if different methods from different existing paradigms are combined. Hence, it puts forward the desirability and feasibility of the multi-paradigmatic approach in cybersecurity economics research. It also outlines several practical guidelines that help design multi-paradigmatic research studies. These are illustrated with a critical evaluation of three examples of studies.
Øverby, Harald (2021)
IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Doi: https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484513
Øverby, Harald & Audestad, Jan A. (2021)
Systems, 9(4) , s. 1-23. Doi: https://doi.org/10.3390/systems9040085 - Fulltekst i vitenarkiv
The multisided platform (MSP) is an essential business construct in the digital economy. Some of the largest companies in the world—including Google, Amazon, and eBay—exploit the MSP in their business models. Fundamental insights into the MSP are crucial to understand the business operations of the digital economy and how new innovative digital services are adopted in the market. The MSP ecosystem is complex and dynamic, and involves heterogeneous stakeholders with different business motivations. This paper classifies the various types of MSPs, distinguished by the network effect between user groups. Moreover, this paper shows how the original diffusion model of Frank Bass can be extended to analyze the temporal evolution of multisided platforms. Analytical models using coupled sets of ordinary differential equations are developed for several examples of two-sided platforms. For some of these examples, analytical solutions are found.
Kianpour, Mazaher; Kowalski, Stewart James & Øverby, Harald (2021)
Sustainability, 13(24) Doi: https://doi.org/10.3390/su132413677 - Fulltekst i vitenarkiv
Insights in the field of cybersecurity economics empower decision makers to make informed decisions that improve their evaluation and management of situations that may lead to catastrophic consequences and threaten the sustainability of digital ecosystems. By drawing on these insights, cybersecurity practitioners have been able to respond to many complex problems that have emerged within the context of cybersecurity over the last two decades. The academic field of cybersecurity economics is highly interdisciplinary since it combines core findings and tools from disciplines such as sociology, psychology, law, political science, and computer science. This study aims to develop an extensive and consistent survey based on a literature review and publicly available reports. This review contributes by aggregating the available knowledge from 28 studies, out of a collection of 628 scholarly articles, to answer five specific research questions. The focus is how identified topics have been conceptualized and studied variously. This review shows that most of the cybersecurity economics models are transitioning from unrealistic, unverifiable, or highly simplified fundamental premises toward dynamic, stochastic, and generalizable models.
Vilalta, Ricard; Munoz, Raul, Cassellas, Ramon, Martinez, Ricardo, Lopez, Victor, Dios, Oscar González de, Pastor, Antonio, Katsikas, Georgios, Klaedtke, Felix, Monti, Paolo, Mozo, Alberto, Zinner, Thomas Erich, Øverby, Harald, Gonzalez-Diaz, Sergio, Lønsethagen, Håkon, Pulido, José-Miguel & King, Daniel (2021)
2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), , s. 377-382. Doi: https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482469 - Fulltekst i vitenarkiv
TeraFlow proposes a new type of secure, cloud-native Software Defined Networking (SDN) controller that will radically advance the state-of-the-art in beyond 5G networks by introducing novel micro-services architecture, and provide revolutionary features for both flow management (service layer) and optical/microwave network equipment integration (infras-tructure layer) by adapting new data models. TeraFlow will also incorporate security using Machine Learning (ML) and forensic evidence for multi-tenancy based on Distributed Ledgers. Finally, this new SDN controller shall be able to integrate with the current Network Function Virtualization (NFV) and Multi-access Edge Computing (MEC) frameworks as well as to other networks. The target pool of TeraFlow stakeholders expands beyond the traditional telecom operators towards edge and hyperscale cloud providers.
Kianpour, Mazaher; Kowalski, Stewart James & Øverby, Harald (2021)
CEUR Workshop Proceedings, 3016, s. 46-65. - Fulltekst i vitenarkiv
In cybersecurity economics, the selection of a particular methodology is a matter of interest and importance for the researchers. Methodologically sophisticated research forms an essential basis for understanding the challenges and opportunities for the richer descriptions of the behavior of cybersecurity practitioners (i.e., what they are doing and why they are doing it). This requires a broad and self-reflective approach to understand the use of a technique in socio-technical research within cybersecurity economics. Such understanding recognizes that research in this field involves more than just applying a method to create knowledge and diffuse it throughout society, organizations, and governments. This paper argues in favor of a multi-paradigmatic approach to cybersecurity economics research. Rather than adopting a single paradigm, this study suggests that results will be more prosperous and reliable if different methods from different existing paradigms are combined. Hence, it puts forward the desirability and feasibility of the multi-paradigmatic approach in cybersecurity economics research. It also outlines several practical guidelines that help design multi-paradigmatic research studies. These are illustrated with a critical evaluation of three examples of studies.
Øverby, Harald (2021)
IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Doi: https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484513
Øverby, Harald & Audestad, Jan A. (2021)
Systems, 9(4) , s. 1-23. Doi: https://doi.org/10.3390/systems9040085 - Fulltekst i vitenarkiv
The multisided platform (MSP) is an essential business construct in the digital economy. Some of the largest companies in the world—including Google, Amazon, and eBay—exploit the MSP in their business models. Fundamental insights into the MSP are crucial to understand the business operations of the digital economy and how new innovative digital services are adopted in the market. The MSP ecosystem is complex and dynamic, and involves heterogeneous stakeholders with different business motivations. This paper classifies the various types of MSPs, distinguished by the network effect between user groups. Moreover, this paper shows how the original diffusion model of Frank Bass can be extended to analyze the temporal evolution of multisided platforms. Analytical models using coupled sets of ordinary differential equations are developed for several examples of two-sided platforms. For some of these examples, analytical solutions are found.
Kianpour, Mazaher; Kowalski, Stewart James & Øverby, Harald (2021)
Sustainability, 13(24) Doi: https://doi.org/10.3390/su132413677 - Fulltekst i vitenarkiv
Insights in the field of cybersecurity economics empower decision makers to make informed decisions that improve their evaluation and management of situations that may lead to catastrophic consequences and threaten the sustainability of digital ecosystems. By drawing on these insights, cybersecurity practitioners have been able to respond to many complex problems that have emerged within the context of cybersecurity over the last two decades. The academic field of cybersecurity economics is highly interdisciplinary since it combines core findings and tools from disciplines such as sociology, psychology, law, political science, and computer science. This study aims to develop an extensive and consistent survey based on a literature review and publicly available reports. This review contributes by aggregating the available knowledge from 28 studies, out of a collection of 628 scholarly articles, to answer five specific research questions. The focus is how identified topics have been conceptualized and studied variously. This review shows that most of the cybersecurity economics models are transitioning from unrealistic, unverifiable, or highly simplified fundamental premises toward dynamic, stochastic, and generalizable models.
Vilalta, Ricard; Munoz, Raul, Cassellas, Ramon, Martinez, Ricardo, Lopez, Victor, Dios, Oscar González de, Pastor, Antonio, Katsikas, Georgios, Klaedtke, Felix, Monti, Paolo, Mozo, Alberto, Zinner, Thomas Erich, Øverby, Harald, Gonzalez-Diaz, Sergio, Lønsethagen, Håkon, Pulido, José-Miguel & King, Daniel (2021)
2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), , s. 377-382. Doi: https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482469 - Fulltekst i vitenarkiv
TeraFlow proposes a new type of secure, cloud-native Software Defined Networking (SDN) controller that will radically advance the state-of-the-art in beyond 5G networks by introducing novel micro-services architecture, and provide revolutionary features for both flow management (service layer) and optical/microwave network equipment integration (infras-tructure layer) by adapting new data models. TeraFlow will also incorporate security using Machine Learning (ML) and forensic evidence for multi-tenancy based on Distributed Ledgers. Finally, this new SDN controller shall be able to integrate with the current Network Function Virtualization (NFV) and Multi-access Edge Computing (MEC) frameworks as well as to other networks. The target pool of TeraFlow stakeholders expands beyond the traditional telecom operators towards edge and hyperscale cloud providers.
Kianpour, Mazaher; Kowalski, Stewart James, Øverby, Harald & Zoto, Erjon (2020)
2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Doi: https://doi.org/10.1109/CogSIMA49017.2020.9216102
Kianpour, Mazaher; Kowalski, Stewart James, Øverby, Harald & Zoto, Erjon (2020)
2020 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Doi: https://doi.org/10.1109/CogSIMA49017.2020.9216102
Øverby, Harald (2019)
arXiv.org, Doi: https://doi.org/10.1364/opex.12.000410
Øverby, Harald & Audestad, Jan Arild (2019)
Social Science Research Network (SSRN), Doi: https://doi.org/10.2139/ssrn.3412902
Kianpour, Mazaher; Kowalski, Stewart James, Zoto, Erjon, Frantz, Christopher & Øverby, Harald (2019)
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), , s. 85-93. Doi: https://doi.org/10.1109/EuroSPW.2019.00016 - Fulltekst i vitenarkiv
Appropriate training is an effective solution to tackle the evolving threat landscape and conflicts in the cyber domain and to fulfill security requirements. Serious games demonstrate pedagogic effectiveness in this field, however, they need to comply with national, organizational, and individual strategies and characteristics. These games provide the players, individually or in groups, with an opportunity to develop their adversarial and system thinking skills to set up effective defenses. To this end, in this paper, we propose a framework for designing serious games that raise security awareness. The proposed framework considers the complex nature of the cyber domain, the knowledge and motivation of participants, and the experiential learning using cyber ranges. The framework is based on existing frameworks, and integrates their advantages to form a comprehensive framework. Future research should refine the framework and design serious games to evaluate its effectiveness in producing desired end results.
Kianpour, Mazaher; Øverby, Harald, Kowalski, Stewart James & Frantz, Christopher (2019)
Lecture Notes in Computer Science (LNCS), 11594 LNCS, s. 149-163. Doi: https://doi.org/10.1007/978-3-030-22351-9_10 - Fulltekst i vitenarkiv
The most costly cybersecurity incidents for organizations result from the failures of their third parties. This means that organizations should not only invest in their own protection and cybersecurity measures, but also pay attention to that of their business and operational partners. While economic impact and real extent of third parties cybersecurity risks is hard to quantify, decision makers inevitably compare their decisions with other entities in their network. This paper presents a theoretically derived model to analyze the impact of social preferences and other factors on the willingness to cooperate in third party ecosystems. We hypothesize that willingness to cooperate among the organizations in the context of cybersecurity increases following the experience of cybersecurity attacks and increased perceived cybersecurity risks. The effects are mediated by perceived cybersecurity value and moderated by social preferences. These hypotheses are tested using a variance-based structural equation modeling analysis based on feedback from a sample of Norwegian organizations. Our empirical results confirm the strong positive impact of social preferences and cybersecurity attack experience on the willingness to cooperate, and support the reciprocal behavior of cybersecurity decision makers. We further show that more perception of cybersecurity risk and value deter the decision makers to cooperate with other organizations.
Li, Shuo; Wong, Eric W M, Øverby, Harald & Zukerman, Moshe (2019)
Journal of Lightwave Technology, 37(13) , s. 3138-3152. Doi: https://doi.org/10.1109/JLT.2019.2911651 - Fulltekst i vitenarkiv
In bufferless optical burst/packet switched (OBS/OPS) networks, data (bursts or packets) may be lost due to contention or equipment failure. Diversity coding-based path protection schemes can be used to protect data from a single-trunk failure with potentially more efficient resource utilization compared to dedicated (e.g., 1 + 1) path protection schemes and help reduce the burst/packet loss ratio. This paper provides a scalable and accurate burst/packet loss ratio approximation based on the Erlang fixed-point approximation for networks that employ protection based on diversity coding and for networks that employ protection based on both diversity coding and 1 + 1 path protection. We use discrete event simulations to assess the accuracy of the approximation based on a wide range of scenarios in a 10-node circular lattice and NSFNet networks. Further, we discuss the effect of parameter settings and the effect of the choice of the wavelength selection method on the accuracy of the approximation. We consider scenarios without wavelength conversion and with full wavelength conversion and two types of users: premium and regular. The premium users, typically of mission critical services, receive protection while the regular users do not. We compare diversity coding and 1 + 1 path protection in a 10-node circular lattice network. The results show that for this example network, for the premium users and under low traffic load, the burst/packet loss ratio in OBS/OPS networks is lower for diversity coding compared to 1 + 1 path protection. However, under heavy traffic load, we observe a lower loss ratio for the case of 1 + 1 path protection.
Øverby, Harald (2019)
arXiv.org, Doi: https://doi.org/10.1364/opex.12.000410
Øverby, Harald & Audestad, Jan Arild (2019)
Social Science Research Network (SSRN), Doi: https://doi.org/10.2139/ssrn.3412902
Kianpour, Mazaher; Kowalski, Stewart James, Zoto, Erjon, Frantz, Christopher & Øverby, Harald (2019)
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), , s. 85-93. Doi: https://doi.org/10.1109/EuroSPW.2019.00016 - Fulltekst i vitenarkiv
Appropriate training is an effective solution to tackle the evolving threat landscape and conflicts in the cyber domain and to fulfill security requirements. Serious games demonstrate pedagogic effectiveness in this field, however, they need to comply with national, organizational, and individual strategies and characteristics. These games provide the players, individually or in groups, with an opportunity to develop their adversarial and system thinking skills to set up effective defenses. To this end, in this paper, we propose a framework for designing serious games that raise security awareness. The proposed framework considers the complex nature of the cyber domain, the knowledge and motivation of participants, and the experiential learning using cyber ranges. The framework is based on existing frameworks, and integrates their advantages to form a comprehensive framework. Future research should refine the framework and design serious games to evaluate its effectiveness in producing desired end results.
Kianpour, Mazaher; Øverby, Harald, Kowalski, Stewart James & Frantz, Christopher (2019)
Lecture Notes in Computer Science (LNCS), 11594 LNCS, s. 149-163. Doi: https://doi.org/10.1007/978-3-030-22351-9_10 - Fulltekst i vitenarkiv
The most costly cybersecurity incidents for organizations result from the failures of their third parties. This means that organizations should not only invest in their own protection and cybersecurity measures, but also pay attention to that of their business and operational partners. While economic impact and real extent of third parties cybersecurity risks is hard to quantify, decision makers inevitably compare their decisions with other entities in their network. This paper presents a theoretically derived model to analyze the impact of social preferences and other factors on the willingness to cooperate in third party ecosystems. We hypothesize that willingness to cooperate among the organizations in the context of cybersecurity increases following the experience of cybersecurity attacks and increased perceived cybersecurity risks. The effects are mediated by perceived cybersecurity value and moderated by social preferences. These hypotheses are tested using a variance-based structural equation modeling analysis based on feedback from a sample of Norwegian organizations. Our empirical results confirm the strong positive impact of social preferences and cybersecurity attack experience on the willingness to cooperate, and support the reciprocal behavior of cybersecurity decision makers. We further show that more perception of cybersecurity risk and value deter the decision makers to cooperate with other organizations.
Li, Shuo; Wong, Eric W M, Øverby, Harald & Zukerman, Moshe (2019)
Journal of Lightwave Technology, 37(13) , s. 3138-3152. Doi: https://doi.org/10.1109/JLT.2019.2911651 - Fulltekst i vitenarkiv
In bufferless optical burst/packet switched (OBS/OPS) networks, data (bursts or packets) may be lost due to contention or equipment failure. Diversity coding-based path protection schemes can be used to protect data from a single-trunk failure with potentially more efficient resource utilization compared to dedicated (e.g., 1 + 1) path protection schemes and help reduce the burst/packet loss ratio. This paper provides a scalable and accurate burst/packet loss ratio approximation based on the Erlang fixed-point approximation for networks that employ protection based on diversity coding and for networks that employ protection based on both diversity coding and 1 + 1 path protection. We use discrete event simulations to assess the accuracy of the approximation based on a wide range of scenarios in a 10-node circular lattice and NSFNet networks. Further, we discuss the effect of parameter settings and the effect of the choice of the wavelength selection method on the accuracy of the approximation. We consider scenarios without wavelength conversion and with full wavelength conversion and two types of users: premium and regular. The premium users, typically of mission critical services, receive protection while the regular users do not. We compare diversity coding and 1 + 1 path protection in a 10-node circular lattice network. The results show that for this example network, for the premium users and under low traffic load, the burst/packet loss ratio in OBS/OPS networks is lower for diversity coding compared to 1 + 1 path protection. However, under heavy traffic load, we observe a lower loss ratio for the case of 1 + 1 path protection.
Øverby, Harald (2018)
Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government, Doi: https://doi.org/10.1145/3234781.3234782 - Fulltekst i vitenarkiv
Network effects are one of the defining properties of the digital economy. It has been shown, both in theory and practice, that network effects contribute to the growth and potential success of businesses in the digital economy. In this paper, we present a quantitative case study of network effects in Facebook for the period 2011 to 2017. We estimate the value of Facebook, and analyse how this value depends on the number of Facebook users. Our results show that there are strong network effects in Facebook, as the value per user increases more than estimations obtained from Metcalfe's law. We also outline a general theory of the strength of network effects, and quantitatively estimate the strength of network effects in Facebook.
Kralevska, Katina; Gligoroski, Danilo, Jensen, Rune Erlend & Øverby, Harald (2018)
IEEE Transactions on Big Data, 4(4) , s. 516-529. Doi: https://doi.org/10.1109/TBDATA.2017.2749255 - Fulltekst i vitenarkiv
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS codes that are simultaneously optimized in terms of storage, reliability, I/O operations, and repair-bandwidth for single and multiple failures of the systematic nodes. The codes were recently introduced in [1] without any specific name. Due to the resemblance between the hashtag sign # and the procedure of the code construction, we call them in this paper HashTag Erasure Codes (HTECs) . HTECs provide the lowest data-read and data-transfer, and thus the lowest repair time for an arbitrary sub-packetization level α , where α≤r⌈k/r⌉ , among all existing MDS codes for distributed storage including MSR codes. The repair process is linear and highly parallel. Additionally, we show that HTECs are the first high-rate MDS codes that reduce the repair bandwidth for more than one failure. Practical implementations of HTECs in Hadoop release 3.0.0-alpha2 demonstrate their great potentials.
Øverby, Harald (2018)
Proceedings of the 2nd International Conference on E-commerce, E-Business and E-Government, Doi: https://doi.org/10.1145/3234781.3234782 - Fulltekst i vitenarkiv
Network effects are one of the defining properties of the digital economy. It has been shown, both in theory and practice, that network effects contribute to the growth and potential success of businesses in the digital economy. In this paper, we present a quantitative case study of network effects in Facebook for the period 2011 to 2017. We estimate the value of Facebook, and analyse how this value depends on the number of Facebook users. Our results show that there are strong network effects in Facebook, as the value per user increases more than estimations obtained from Metcalfe's law. We also outline a general theory of the strength of network effects, and quantitatively estimate the strength of network effects in Facebook.
Kralevska, Katina; Gligoroski, Danilo, Jensen, Rune Erlend & Øverby, Harald (2018)
IEEE Transactions on Big Data, 4(4) , s. 516-529. Doi: https://doi.org/10.1109/TBDATA.2017.2749255 - Fulltekst i vitenarkiv
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS codes that are simultaneously optimized in terms of storage, reliability, I/O operations, and repair-bandwidth for single and multiple failures of the systematic nodes. The codes were recently introduced in [1] without any specific name. Due to the resemblance between the hashtag sign # and the procedure of the code construction, we call them in this paper HashTag Erasure Codes (HTECs) . HTECs provide the lowest data-read and data-transfer, and thus the lowest repair time for an arbitrary sub-packetization level α , where α≤r⌈k/r⌉ , among all existing MDS codes for distributed storage including MSR codes. The repair process is linear and highly parallel. Additionally, we show that HTECs are the first high-rate MDS codes that reduce the repair bandwidth for more than one failure. Practical implementations of HTECs in Hadoop release 3.0.0-alpha2 demonstrate their great potentials.
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2016)
2016 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), , s. 280-284. Doi: https://doi.org/10.1109/ISTC.2016.7593121
We introduce a family of balanced locally repairable codes (BLRCs) [n, k, d] for arbitrary values of n, k and d. Similar to other locally repairable codes (LRCs), the presented codes are suitable for applications that require a low repair locality. The novelty that we introduce in our construction is that we relax the strict requirement the repair locality to be a fixed small number I, and we allow the repair locality to be either I or I + 1. This gives us the flexibility to construct BLRCs for arbitrary values of n and k which partially solves the open problem of finding a general construction of LRCs. Additionally, the relaxed locality criteria gives us an opportunity to search for BLRCs that have a low repair locality even when double failures occur. We use metrics such as a storage overhead, an average repair bandwidth, a Mean Time To Data Loss (MTTDL) and an update complexity to compare the performance of BLRCs with existing LRCs.
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2016)
IEEE Communications Letters, 20(7) , s. 1281-1284. Doi: https://doi.org/10.1109/LCOMM.2016.2561287
Li, Shuo; Wang, Meiqian, Wong, Eric W M, Øverby, Harald & Zukerman, Moshe (2016)
IEEE Photonics Technology Letters, 28(15) , s. 1688-1691. Doi: https://doi.org/10.1109/LPT.2016.2562676
Biczok, Gergely; Chen, Yanling, Kralevska, Katina & Øverby, Harald (2016)
IEEE International Conference on High Performance Switching and Routing, HPSR, , s. 61-68. Doi: https://doi.org/10.1109/HPSR.2016.7525640
Mitrpanont, Jarernsri L.; Ismail, Abdul Samad Haji, Øverby, Harald & Kaneko, Keiichi (2016)
IEEE (Institute of Electrical and Electronics Engineers)
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2016)
2016 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), , s. 280-284. Doi: https://doi.org/10.1109/ISTC.2016.7593121
We introduce a family of balanced locally repairable codes (BLRCs) [n, k, d] for arbitrary values of n, k and d. Similar to other locally repairable codes (LRCs), the presented codes are suitable for applications that require a low repair locality. The novelty that we introduce in our construction is that we relax the strict requirement the repair locality to be a fixed small number I, and we allow the repair locality to be either I or I + 1. This gives us the flexibility to construct BLRCs for arbitrary values of n and k which partially solves the open problem of finding a general construction of LRCs. Additionally, the relaxed locality criteria gives us an opportunity to search for BLRCs that have a low repair locality even when double failures occur. We use metrics such as a storage overhead, an average repair bandwidth, a Mean Time To Data Loss (MTTDL) and an update complexity to compare the performance of BLRCs with existing LRCs.
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2016)
IEEE Communications Letters, 20(7) , s. 1281-1284. Doi: https://doi.org/10.1109/LCOMM.2016.2561287
Li, Shuo; Wang, Meiqian, Wong, Eric W M, Øverby, Harald & Zukerman, Moshe (2016)
IEEE Photonics Technology Letters, 28(15) , s. 1688-1691. Doi: https://doi.org/10.1109/LPT.2016.2562676
Biczok, Gergely; Chen, Yanling, Kralevska, Katina & Øverby, Harald (2016)
IEEE International Conference on High Performance Switching and Routing, HPSR, , s. 61-68. Doi: https://doi.org/10.1109/HPSR.2016.7525640
Mitrpanont, Jarernsri L.; Ismail, Abdul Samad Haji, Øverby, Harald & Kaneko, Keiichi (2016)
IEEE (Institute of Electrical and Electronics Engineers)
Gligoroski, Danilo; Kralevska, Katina & Øverby, Harald (2015)
IEEE International Conference on Communication, ICC 2015, Workshop Proceedings, , s. 680-685. Doi: https://doi.org/10.1109/ICCW.2015.7247260
Li, Shuo; Wang, Meiqian, Øverby, Harald, Wong, Eric & Zukerman, Moshe (2015)
IEEE Photonics Technology Letters, 27(20) , s. 2115-2118. Doi: https://doi.org/10.1109/LPT.2015.2453204
Kralevska, Katina; Øverby, Harald & Gligoroski, Danilo (2015)
2015 IEEE Global Communications Conference (GLOBECOM), Doi: https://doi.org/10.1109/glocom.2015.7417372
Idland, Elisabeth; Øverby, Harald & Audestad, Jan Arild (2015)
NIKT: Norsk IKT-konferanse for forskning og utdanning,
Gligoroski, Danilo; Kralevska, Katina & Øverby, Harald (2015)
IEEE International Conference on Communication, ICC 2015, Workshop Proceedings, , s. 680-685. Doi: https://doi.org/10.1109/ICCW.2015.7247260
Li, Shuo; Wang, Meiqian, Øverby, Harald, Wong, Eric & Zukerman, Moshe (2015)
IEEE Photonics Technology Letters, 27(20) , s. 2115-2118. Doi: https://doi.org/10.1109/LPT.2015.2453204
Kralevska, Katina; Øverby, Harald & Gligoroski, Danilo (2015)
2015 IEEE Global Communications Conference (GLOBECOM), Doi: https://doi.org/10.1109/glocom.2015.7417372
Idland, Elisabeth; Øverby, Harald & Audestad, Jan Arild (2015)
NIKT: Norsk IKT-konferanse for forskning og utdanning,
Kralevska, Katina; Hadzi-Velkov, Zoran & Øverby, Harald (2014)
Advances in Intelligent Systems and Computing, 231, s. 283-289. Doi: https://doi.org/10.1007/978-3-319-01466-1_27
Kralevska, Katina; Øverby, Harald & Gligoroski, Danilo (2014)
2014 22nd Telecommunications Forum (TELFOR), , s. 589-592. Doi: https://doi.org/10.1109/TELFOR.2014.7034478
We introduce a method that combines joint balanced source and network coding in optical packet-switched networks. It is an efficient way to combat packet loss that occurs due to contentions, to recover lost data due to link failures and to provide secure data transmission, i.e., secrecy. By using binary erasure codes and adding redundancy the destination is able to decode the source data when packet loss occurs. Coding at the intermediate node offers protection against single link failure. An eavesdropper cannot reconstruct the source data by eavesdropping a single link, since non-systematic coded packets are sent on disjoint paths.We also show that the proposed method has linear coding complexity, small header overhead and it does not require sending a feedback for each packet.
Savi, Michele; Øverby, Harald, Stol, Norvald & Raffaelli, Carla (2014)
Computer Networks, Doi: https://doi.org/10.1016/j.comnet.2014.07.009
Kralevska, Katina; Hadzi-Velkov, Zoran & Øverby, Harald (2014)
Advances in Intelligent Systems and Computing, 231, s. 283-289. Doi: https://doi.org/10.1007/978-3-319-01466-1_27
Kralevska, Katina; Øverby, Harald & Gligoroski, Danilo (2014)
2014 22nd Telecommunications Forum (TELFOR), , s. 589-592. Doi: https://doi.org/10.1109/TELFOR.2014.7034478
We introduce a method that combines joint balanced source and network coding in optical packet-switched networks. It is an efficient way to combat packet loss that occurs due to contentions, to recover lost data due to link failures and to provide secure data transmission, i.e., secrecy. By using binary erasure codes and adding redundancy the destination is able to decode the source data when packet loss occurs. Coding at the intermediate node offers protection against single link failure. An eavesdropper cannot reconstruct the source data by eavesdropping a single link, since non-systematic coded packets are sent on disjoint paths.We also show that the proposed method has linear coding complexity, small header overhead and it does not require sending a feedback for each packet.
Savi, Michele; Øverby, Harald, Stol, Norvald & Raffaelli, Carla (2014)
Computer Networks, Doi: https://doi.org/10.1016/j.comnet.2014.07.009
Panggabean, Mauritz; Rønningen, Leif Arne & Øverby, Harald (2013)
Simulation modelling practice and theory, 31, s. 132-148. Doi: https://doi.org/10.1016/j.simpat.2012.10.010
Babarczi, Peter; Biczok, Gergely, Øverby, Harald, tapolcai, janos & Soproni, P (2013)
Computer Networks, 57(9) , s. 1974-1990. Doi: https://doi.org/10.1016/j.comnet.2013.03.015
Savi, Michele; Øvreby, Harald, Stol, Norvald & Raffaelli, Carla (2013)
17th International Conference on Optical Networking Design and Modeling,
Yang, Shuna; Stol, Norvald & Øverby, Harald (2013)
17th International Conference on Optical Networking Design and Modeling, , s. 88-93. Doi: https://doi.org/10.1016/j.comcom.2004.12.002
Panggabean, Mauritz; Wielgosz, Maciej, Øverby, Harald & Rønningen, Leif Arne (2013)
International Journal of Advanced Computer Science and Applications (IJACSA), 4(12) , s. 202-211. Doi: https://doi.org/10.14569/IJACSA.2013.041230
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2013)
Lecture Notes in Computer Science (LNCS), 8115, s. 161-172. Doi: https://doi.org/10.1007/978-3-642-40552-5_15
Panggabean, Mauritz; Rønningen, Leif Arne & Øverby, Harald (2013)
Simulation modelling practice and theory, 31, s. 132-148. Doi: https://doi.org/10.1016/j.simpat.2012.10.010
Babarczi, Peter; Biczok, Gergely, Øverby, Harald, tapolcai, janos & Soproni, P (2013)
Computer Networks, 57(9) , s. 1974-1990. Doi: https://doi.org/10.1016/j.comnet.2013.03.015
Savi, Michele; Øvreby, Harald, Stol, Norvald & Raffaelli, Carla (2013)
17th International Conference on Optical Networking Design and Modeling,
Yang, Shuna; Stol, Norvald & Øverby, Harald (2013)
17th International Conference on Optical Networking Design and Modeling, , s. 88-93. Doi: https://doi.org/10.1016/j.comcom.2004.12.002
Panggabean, Mauritz; Wielgosz, Maciej, Øverby, Harald & Rønningen, Leif Arne (2013)
International Journal of Advanced Computer Science and Applications (IJACSA), 4(12) , s. 202-211. Doi: https://doi.org/10.14569/IJACSA.2013.041230
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2013)
Lecture Notes in Computer Science (LNCS), 8115, s. 161-172. Doi: https://doi.org/10.1007/978-3-642-40552-5_15
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
16th International Conference on Optical Network Design and Modeling (ONDM), 2012, Doi: https://doi.org/10.1109/ondm.2012.6210178
Øverby, Harald; Biczok, Gergely & Audestad, Jan Arild (2012)
Proceedings of World Telecommunications Congress,
Falck-Ytter, Martin & Øverby, Harald (2012)
Proceedings of World Telecommunications Congress,
Yang, Shuna; Stol, Norvald & Øverby, Harald (2012)
Proceedings 17th European Conference on network and Optical Communication, June 20-22, 2012, Catalonia Spain, Doi: https://doi.org/10.1109/noc.2012.6249934
Øverby, Harald; Biczok, Gergely, Babarczi, Peter & tapolcai, janos (2012)
IEEE International Conference on Communications, Doi: https://doi.org/10.1109/icc.2012.6363928
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
2012 IEEE Global Telecommunications Conference -GLOBECOM 2012, , s. 2882-2888. Doi: https://doi.org/10.1109/GLOCOM.2012.6503554
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
16th International Conference on Optical Network Design and Modeling (ONDM), 2012, Doi: https://doi.org/10.1109/ondm.2012.6210178
Øverby, Harald; Biczok, Gergely & Audestad, Jan Arild (2012)
Proceedings of World Telecommunications Congress,
Falck-Ytter, Martin & Øverby, Harald (2012)
Proceedings of World Telecommunications Congress,
Yang, Shuna; Stol, Norvald & Øverby, Harald (2012)
Proceedings 17th European Conference on network and Optical Communication, June 20-22, 2012, Catalonia Spain, Doi: https://doi.org/10.1109/noc.2012.6249934
Øverby, Harald; Biczok, Gergely, Babarczi, Peter & tapolcai, janos (2012)
IEEE International Conference on Communications, Doi: https://doi.org/10.1109/icc.2012.6363928
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
2012 IEEE Global Telecommunications Conference -GLOBECOM 2012, , s. 2882-2888. Doi: https://doi.org/10.1109/GLOCOM.2012.6503554
Biczok, Gergely & Øverby, Harald (2011)
NIKT: Norsk IKT-konferanse for forskning og utdanning,
Øverby, Harald (2011)
International Conference on Transparent Optical Networks (ICTON), Doi: https://doi.org/10.1109/icton.2011.5971141
Biczok, Gergely & Øverby, Harald (2011)
NIKT: Norsk IKT-konferanse for forskning og utdanning,
Øverby, Harald (2011)
International Conference on Transparent Optical Networks (ICTON), Doi: https://doi.org/10.1109/icton.2011.5971141
Kimsas, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2010)
IET Communications, 4(3) , s. 334-342. Doi: https://doi.org/10.1049/iet-com.2009.0295
Kimsas, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2010)
IET Communications, 4(3) , s. 334-342. Doi: https://doi.org/10.1049/iet-com.2009.0295
Øverby, Harald (2009)
IEEE Global Communications Conference, Exhibition, & Industry Forum (GLOBECOM), Doi: https://doi.org/10.1109/GLOCOM.2009.5426312
Kimsas, Andreas; Øverby, Harald & Stol, Norvald (2009)
Proceedings of the 5th advanced international conference on telecommunications, , s. 381-388.
Øverby, Harald (2009)
Proceedings of the international conference on photonics and switching 2009,
Øverby, Harald (2009)
IEEE Global Communications Conference, Exhibition, & Industry Forum (GLOBECOM), Doi: https://doi.org/10.1109/GLOCOM.2009.5426312
Kimsas, Andreas; Øverby, Harald & Stol, Norvald (2009)
Proceedings of the 5th advanced international conference on telecommunications, , s. 381-388.
Øverby, Harald (2009)
Proceedings of the international conference on photonics and switching 2009,
Øverby, Harald (2008)
Journal of Optical Networking, 7(4) , s. 294-309.
Øverby, Harald (2008)
Journal of Optical Networking, 7(4) , s. 294-309.
Øverby, Harald (2007)
Photonic network communications, 13(2) , s. 183-194. Doi: https://doi.org/10.1007/s11107-006-0036-z
Kimsas, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2007)
11th International IFIP TC6 Conference, ONDM 2007, , s. 146-155.
Øverby, Harald (2007)
Computer Communications, 30(6) , s. 1229-1243. Doi: https://doi.org/10.1016/j.comcom.2006.12.005
Øverby, Harald (2007)
Photonic network communications, 13(2) , s. 183-194. Doi: https://doi.org/10.1007/s11107-006-0036-z
Kimsas, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2007)
11th International IFIP TC6 Conference, ONDM 2007, , s. 146-155.
Øverby, Harald (2007)
Computer Communications, 30(6) , s. 1229-1243. Doi: https://doi.org/10.1016/j.comcom.2006.12.005
Øverby, Harald (2006)
Proceedings of the 11th European Conference on Networks and Optical Communications, , s. 519-526.
Øverby, Harald (2006)
Proceedings of the 11th European Conference on Networks and Optical Communications, , s. 512-518.
Øverby, Harald (2006)
Journal of Optical Networking, 5(10) , s. 747-763.
Øverby, Harald (2006)
Proceedings of the 10th Conference on Optical Network Design and Modelling,
Stol, Norvald; Øverby, Harald, Bjørnstad, Steinar, Kimsås, Andreas & Mykkeltveit, Anders (2006)
Proceedings of the 10th Conference on Optical Network Design and Modelling,
Kimsås, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2006)
proceedings of the 32th European Conference on Optical Communications, , s. 407-408.
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Stol, Norvald (2006)
Proceedings of the 8th International Conference on Transparent Optical Networks, volume 3,
Øverby, Harald; Stol, Norvald & Nord, Martin (2006)
IEEE Communications Magazine, 44(8) , s. 52-57.
Øverby, Harald & Stol, Norvald (2006)
Wireless Networks - The Journal of Mobile Communication, Computation and Information, 12(3) , s. 383-394.
Øverby, Harald (2006)
Proceedings of the Advanced International Conference on Telecommunications (AICT'06),
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Tuft, Vegard Larsen (2006)
Proceedings of the Advanced International Conference on Telecommunications (AICT'06),
Øverby, Harald (2006)
Proceedings of the Advanced International Conference on Telecommunications (AICT'06),
Øverby, Harald (2006)
Proceedings of the 11th European Conference on Networks and Optical Communications, , s. 519-526.
Øverby, Harald (2006)
Proceedings of the 11th European Conference on Networks and Optical Communications, , s. 512-518.
Øverby, Harald (2006)
Journal of Optical Networking, 5(10) , s. 747-763.
Øverby, Harald (2006)
Proceedings of the 10th Conference on Optical Network Design and Modelling,
Stol, Norvald; Øverby, Harald, Bjørnstad, Steinar, Kimsås, Andreas & Mykkeltveit, Anders (2006)
Proceedings of the 10th Conference on Optical Network Design and Modelling,
Kimsås, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2006)
proceedings of the 32th European Conference on Optical Communications, , s. 407-408.
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Stol, Norvald (2006)
Proceedings of the 8th International Conference on Transparent Optical Networks, volume 3,
Øverby, Harald; Stol, Norvald & Nord, Martin (2006)
IEEE Communications Magazine, 44(8) , s. 52-57.
Øverby, Harald & Stol, Norvald (2006)
Wireless Networks - The Journal of Mobile Communication, Computation and Information, 12(3) , s. 383-394.
Øverby, Harald (2006)
Proceedings of the Advanced International Conference on Telecommunications (AICT'06),
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Tuft, Vegard Larsen (2006)
Proceedings of the Advanced International Conference on Telecommunications (AICT'06),
Øverby, Harald (2006)
Proceedings of the Advanced International Conference on Telecommunications (AICT'06),
Øverby, Harald (2005)
IEEE Photonics Technology Letters, 17(11) , s. 2469-2471.
Bjørnstad, Steinar; Øverby, Harald, Stol, Norvald & Hjelme, Dag Roar (2005)
31st European Conference on Optical Communications - ECOC 2005 - Proceedings, , s. 695-696.
Øverby, Harald; Stol, Norvald & Bjørnstad, Steinar (2005)
Proceedings of the 7th International Conference on Transparent Optical networks (ICTON) in Barcelona, Vol. 1, , s. 385-388.
Øverby, Harald (2005)
Proceedings of the 7th International Conference on Transparent Optical networks (ICTON) in Barcelona, Vol. 1, , s. 62-66.
Bjørnstad, Steinar & Øverby, Harald (2005)
Proceedings of the 7th International Conference on Transparent Optical networks (ICTON) in Barcelona, Vol. 1, , s. 85-90.
Øverby, Harald (2005)
Optics Express, 13(5) , s. 1685-1695. Doi: https://doi.org/10.1364/OPEX.13.001685 - Fulltekst i vitenarkiv
Stochastic processes have been widely employed in order to assess the network layer performance of Optical Packet Switched (OPS) networks. In this paper we consider how the Engset traffic model may be applied to evaluate the blocking probability in asynchronous bufferless OPS networks. We present two types of the Engset traffic model, i.e. the Engset lost calls cleared traffic model and the Engset overflow traffic model. For both traffic models, the time-, call-, and traffic congestion are derived. A numerical study shows that the observed blocking probability is dependent on the choice of traffic model and performance metric.
Øverby, Harald & Stol, Norvald (2005)
Computer Communications, 28
Øverby, Harald (2005)
IEEE Photonics Technology Letters, 17(11) , s. 2469-2471.
Bjørnstad, Steinar; Øverby, Harald, Stol, Norvald & Hjelme, Dag Roar (2005)
31st European Conference on Optical Communications - ECOC 2005 - Proceedings, , s. 695-696.
Øverby, Harald; Stol, Norvald & Bjørnstad, Steinar (2005)
Proceedings of the 7th International Conference on Transparent Optical networks (ICTON) in Barcelona, Vol. 1, , s. 385-388.
Øverby, Harald (2005)
Proceedings of the 7th International Conference on Transparent Optical networks (ICTON) in Barcelona, Vol. 1, , s. 62-66.
Bjørnstad, Steinar & Øverby, Harald (2005)
Proceedings of the 7th International Conference on Transparent Optical networks (ICTON) in Barcelona, Vol. 1, , s. 85-90.
Øverby, Harald (2005)
Optics Express, 13(5) , s. 1685-1695. Doi: https://doi.org/10.1364/OPEX.13.001685 - Fulltekst i vitenarkiv
Stochastic processes have been widely employed in order to assess the network layer performance of Optical Packet Switched (OPS) networks. In this paper we consider how the Engset traffic model may be applied to evaluate the blocking probability in asynchronous bufferless OPS networks. We present two types of the Engset traffic model, i.e. the Engset lost calls cleared traffic model and the Engset overflow traffic model. For both traffic models, the time-, call-, and traffic congestion are derived. A numerical study shows that the observed blocking probability is dependent on the choice of traffic model and performance metric.
Øverby, Harald & Stol, Norvald (2005)
Computer Communications, 28
Øverby, Harald & Stol, Norvald (2004)
Chinese Optics Letters (COL), 2(3) , s. 131-134.
In this paper we present an analytical model, which considers the effects of the switching time on the network performance in service differentiated Optical Packet/Burst Switched networks (OPS/OBS). Our results indicate that the switching time must be less than 10 % of the packet/burst duration in order to avoid any significant reductions in the network performance. Furthermore, regarding a network with full wavelength conversion, we show that the benefits of statistical resource sharing are almost non-existent for low priority traffic when the switching time is large.
Nord, Martin; Øverby, Harald & Stol, Norvald (2004)
Journal of Optical Networking, 3(12) , s. 866-866.
Arnemo, Jon Martin; Heim, Morten, Øen, Egil Ole, Berntsen, Finn, Kvale, Bjarne, Os, Øystein & Øverby, Harald (2004)
Norsk veterinærtidsskrift, 116(7) , s. 531-535.
I perioden 1976-2000 ble det utført i alt 1898 medikamentelle immobiliseringer av viltlevende elg i Norge. Tretten dyr(0,7 ? døde eller måtte avlives i tilslutning til innfangingen. Anbefalt metode for immobilisering av viltlevende elg i Norge er administrasjon av etorfin ved hjelp av injeksjonsvåpenfra helikopter på snødekt mark. Risikoen for mortalitet ved denne metoden er meget liten: kun åtte dyr (0,5 ? døde av i alt 1526 immobiliseringer foretatt fra 1984 til 2004. Dødsårsaker var drukning (én voksen ku og én voksen okse), respirasjonsstans etter intravaskulær injeksjon (én voksen ku), skade iryggmargen forårsaket av injeksjonspilen (én avmagret kalv med beinskjørhet og parasittær lungebetennelse) og respirasjonsstans forårsaket av en relativ overdosering (fire kalver i dårlig kondisjon). Standard dose for etorfin er 7,50 ? 9,00mg/voksen og 3,75 ?4,50 mg/kalv. Dyr som ikke har lagt seg innenti minutter etter første injeksjon, kan påskytes på nyttmed full dose. A total of 1,898 chemical immobilizations of free-rangingmoose (Alces alces) were carried out in Norway from 1976 to 2004. Thirteen animals (0.7 ? died or were euthanized. The recommended method for immobilization of free-ranging moose inNorway is darting from a helicopter with etorphine on snow-covered ground. The risk of mortality with this method is verylow, only eight animals (0.5 ? died during 1,526 captures from 1984 to 2004. Causes of mortality were drowning in one adult female and one adult male, respiratory arrest due to intravascular injection in an adult female, traumatic spinal lesions due to dart impact in the lumbar region in a cachectic calf with osteoporosis and verminous pneumonia, and respiratoryarrest due to relative overdosing in four calves in poor body condition. The standard doses of etorphine are 7.5-9.0 mg/animal in adults and 3.75-4.50 mg/animal in calves. Animals which are not down within ten minutes after initial darting canbe redarted with a full dose.
Øverby, Harald & Stol, Norvald (2004)
Optics Express, 12(3) , s. 410-415. Doi: https://doi.org/10.1364/OPEX.12.000410 - Fulltekst i vitenarkiv
Service differentiation is a crucial issue in the next-generation Optical Packet Switched networks. In this paper we examine how bursty traffic influences the performance of a service differentiated Optical Packet Switched network. By using time-continuous Markov chains, we derive explicit results for the packet loss rates in the case of a bursty hyper-exponential arrival process. Results indicate that the performance is degraded as the burstiness of the arrival process increases.
Øverby, Harald & Stol, Norvald (2004)
Telecommunications Systems, 27(2-4) , s. 151-179.
Optical Packet Switching (OPS) is a promising technology for future core networks due to the ability to handle bursty traffic, adaptability to changes in the network infrastructure and good network utilization. In order to provide sufficient Quality of Service (QoS) to the emerging range of real-time and critical business applications, service differentiation should be present in future OPS. This paper presents the Preemptive Drop Policy (PDP), which provides service differentiation in asynchronous bufferless OPS. Based on time-continuous Markov chains, we introduce an analytical model of the PDP for switches with and without wavelength conversion. We extend the PDP into the Adaptive PDP (APDP), which provides absolute QoS guarantees in OPS. Simulations performed validate our analytical model and show that the APDP operates properly in a dynamic changing system load scenario.
Øverby, Harald (2004)
Optics Express, 12(20) , s. 4881-4895. Doi: https://doi.org/10.1364/OPEX.12.004881 - Fulltekst i vitenarkiv
A crucial issue in optical packet switched (OPS) networks is packet losses at the network layer caused by contentions. This paper presents the network layer packet redundancy scheme (NLPRS), which is a novel approach to reduce the end-to-end data packet loss rate in OPS networks. By introducing redundancy packets in the OPS network, the NLPRS enables a possible reconstruction of data packets that are lost due to contentions. An analytical model of the NLPRS based on reduced load Erlang fix-point analysis is presented. Simulations of an OPS ring network show that the NLPRS is in particular efficient in small networks operating at low system loads. Results also show how the arrival process, packet length distribution, network size and redundancy packet scheduling mechanism influence the NLPRS performance.
Øverby, Harald & Stol, Norvald (2004)
Chinese Optics Letters (COL), 2(3) , s. 131-134.
In this paper we present an analytical model, which considers the effects of the switching time on the network performance in service differentiated Optical Packet/Burst Switched networks (OPS/OBS). Our results indicate that the switching time must be less than 10 % of the packet/burst duration in order to avoid any significant reductions in the network performance. Furthermore, regarding a network with full wavelength conversion, we show that the benefits of statistical resource sharing are almost non-existent for low priority traffic when the switching time is large.
Nord, Martin; Øverby, Harald & Stol, Norvald (2004)
Journal of Optical Networking, 3(12) , s. 866-866.
Arnemo, Jon Martin; Heim, Morten, Øen, Egil Ole, Berntsen, Finn, Kvale, Bjarne, Os, Øystein & Øverby, Harald (2004)
Norsk veterinærtidsskrift, 116(7) , s. 531-535.
I perioden 1976-2000 ble det utført i alt 1898 medikamentelle immobiliseringer av viltlevende elg i Norge. Tretten dyr(0,7 ? døde eller måtte avlives i tilslutning til innfangingen. Anbefalt metode for immobilisering av viltlevende elg i Norge er administrasjon av etorfin ved hjelp av injeksjonsvåpenfra helikopter på snødekt mark. Risikoen for mortalitet ved denne metoden er meget liten: kun åtte dyr (0,5 ? døde av i alt 1526 immobiliseringer foretatt fra 1984 til 2004. Dødsårsaker var drukning (én voksen ku og én voksen okse), respirasjonsstans etter intravaskulær injeksjon (én voksen ku), skade iryggmargen forårsaket av injeksjonspilen (én avmagret kalv med beinskjørhet og parasittær lungebetennelse) og respirasjonsstans forårsaket av en relativ overdosering (fire kalver i dårlig kondisjon). Standard dose for etorfin er 7,50 ? 9,00mg/voksen og 3,75 ?4,50 mg/kalv. Dyr som ikke har lagt seg innenti minutter etter første injeksjon, kan påskytes på nyttmed full dose. A total of 1,898 chemical immobilizations of free-rangingmoose (Alces alces) were carried out in Norway from 1976 to 2004. Thirteen animals (0.7 ? died or were euthanized. The recommended method for immobilization of free-ranging moose inNorway is darting from a helicopter with etorphine on snow-covered ground. The risk of mortality with this method is verylow, only eight animals (0.5 ? died during 1,526 captures from 1984 to 2004. Causes of mortality were drowning in one adult female and one adult male, respiratory arrest due to intravascular injection in an adult female, traumatic spinal lesions due to dart impact in the lumbar region in a cachectic calf with osteoporosis and verminous pneumonia, and respiratoryarrest due to relative overdosing in four calves in poor body condition. The standard doses of etorphine are 7.5-9.0 mg/animal in adults and 3.75-4.50 mg/animal in calves. Animals which are not down within ten minutes after initial darting canbe redarted with a full dose.
Øverby, Harald & Stol, Norvald (2004)
Optics Express, 12(3) , s. 410-415. Doi: https://doi.org/10.1364/OPEX.12.000410 - Fulltekst i vitenarkiv
Service differentiation is a crucial issue in the next-generation Optical Packet Switched networks. In this paper we examine how bursty traffic influences the performance of a service differentiated Optical Packet Switched network. By using time-continuous Markov chains, we derive explicit results for the packet loss rates in the case of a bursty hyper-exponential arrival process. Results indicate that the performance is degraded as the burstiness of the arrival process increases.
Øverby, Harald & Stol, Norvald (2004)
Telecommunications Systems, 27(2-4) , s. 151-179.
Optical Packet Switching (OPS) is a promising technology for future core networks due to the ability to handle bursty traffic, adaptability to changes in the network infrastructure and good network utilization. In order to provide sufficient Quality of Service (QoS) to the emerging range of real-time and critical business applications, service differentiation should be present in future OPS. This paper presents the Preemptive Drop Policy (PDP), which provides service differentiation in asynchronous bufferless OPS. Based on time-continuous Markov chains, we introduce an analytical model of the PDP for switches with and without wavelength conversion. We extend the PDP into the Adaptive PDP (APDP), which provides absolute QoS guarantees in OPS. Simulations performed validate our analytical model and show that the APDP operates properly in a dynamic changing system load scenario.
Øverby, Harald (2004)
Optics Express, 12(20) , s. 4881-4895. Doi: https://doi.org/10.1364/OPEX.12.004881 - Fulltekst i vitenarkiv
A crucial issue in optical packet switched (OPS) networks is packet losses at the network layer caused by contentions. This paper presents the network layer packet redundancy scheme (NLPRS), which is a novel approach to reduce the end-to-end data packet loss rate in OPS networks. By introducing redundancy packets in the OPS network, the NLPRS enables a possible reconstruction of data packets that are lost due to contentions. An analytical model of the NLPRS based on reduced load Erlang fix-point analysis is presented. Simulations of an OPS ring network show that the NLPRS is in particular efficient in small networks operating at low system loads. Results also show how the arrival process, packet length distribution, network size and redundancy packet scheduling mechanism influence the NLPRS performance.
Øien, Geir Egil; Breivik, Morten, Hergum, Ragnar, Ildstad, Erling, Jaccheri, Maria Letizia, Rønquist, Einar & Øverby, Harald (2016)
[Kronikk]
Øien, Geir Egil; Breivik, Morten, Hergum, Ragnar, Ildstad, Erling, Jaccheri, Maria Letizia, Rønquist, Einar & Øverby, Harald (2016)
[Kronikk]
Øverby, Harald & Audestad, Jan Arild (2021)
[Textbook]. Springer
Øverby, Harald & Audestad, Jan Arild (2021)
[Textbook]. Springer
Kianpour, Mazaher; Kowalski, Stewart James, Øverby, Harald & Zoto, Erjon (2020)
[Conference Poster]. Event
Kianpour, Mazaher; Kowalski, Stewart James, Øverby, Harald & Zoto, Erjon (2020)
[Conference Poster]. Event
Øverby, Harald & Audestad, Jan Arild (2018)
[Textbook]. CreateSpace Independent Publishing
Øverby, Harald (2018)
[Conference Lecture]. Event
Øverby, Harald & Audestad, Jan Arild (2018)
[Textbook]. CreateSpace Independent Publishing
Øverby, Harald (2018)
[Conference Lecture]. Event
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2016)
[Conference Poster]. Event
Kralevska, Katina; Gligoroski, Danilo & Øverby, Harald (2016)
[Conference Poster]. Event
Idland, Elisabeth; Øverby, Harald & Arild, audestad Jan (2015)
[Conference Lecture]. Event
Idland, Elisabeth; Øverby, Harald & Arild, audestad Jan (2015)
[Conference Lecture]. Event
Yang, Shuna; Stol, Norvald & Øverby, Harald (2013)
[Conference Lecture]. Event
Yang, Shuna; Stol, Norvald & Øverby, Harald (2013)
[Conference Lecture]. Event
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
[Conference Lecture]. Event
Øverby, Harald; Biczok, Gergely & Audestad, Jan Arild (2012)
[Conference Lecture]. Event
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
[Conference Lecture]. Event
Yang, Shuna; Stol, Norvald & Øverby, Harald (2012)
[Conference Lecture]. Event
Øverby, Harald (2012)
[Conference Lecture]. Event
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
[Conference Lecture]. Event
Øverby, Harald; Biczok, Gergely & Audestad, Jan Arild (2012)
[Conference Lecture]. Event
Savi, Michele; Stol, Norvald, Øverby, Harald & Raffaelli, Carla (2012)
[Conference Lecture]. Event
Yang, Shuna; Stol, Norvald & Øverby, Harald (2012)
[Conference Lecture]. Event
Øverby, Harald (2012)
[Conference Lecture]. Event
Biczok, Gergely & Øverby, Harald (2011)
[Conference Lecture]. Event
Øverby, Harald (2011)
[Conference Lecture]. Event
Biczok, Gergely & Øverby, Harald (2011)
[Conference Lecture]. Event
Øverby, Harald (2011)
[Conference Lecture]. Event
Øverby, Harald (2009)
[Conference Lecture]. Event
Øverby, Harald (2009)
[Conference Lecture]. Event
Øverby, Harald (2009)
[Conference Lecture]. Event
Øverby, Harald (2009)
[Conference Lecture]. Event
Øverby, Harald (2009)
[Conference Lecture]. Event
Øverby, Harald (2009)
[Conference Lecture]. Event
Kimsas, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2007)
[Conference Lecture]. Event
Kimsas, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2007)
[Conference Lecture]. Event
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Stol, Norvald (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Stol, Norvald; Øverby, Harald, Bjørnstad, Steinar, Kimsås, Andreas & Mykkeltveit, Anders (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Kimsås, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2006)
[Conference Lecture]. Event
Kimsås, Andreas; Bjørnstad, Steinar, Øverby, Harald & Tuft, Vegard Larsen (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Nord, Martin; Bjørnstad, Steinar, Tuft, Vegard, Kimsås, Andreas, Hjelme, Dag Roar, Eriksen, Lars Erik, Olsen, Torodd, Øverby, Harald, Sudbø, Aasmund Sveinung, Stol, Norvald, Austad, Oddgeir, Kåråsen, Anne-Grete & Millstein, Geir (2006)
[Report Research]. Telenor R&I
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Tuft, Vegard Larsen (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Stol, Norvald (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Stol, Norvald; Øverby, Harald, Bjørnstad, Steinar, Kimsås, Andreas & Mykkeltveit, Anders (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Kimsås, Andreas; Bjørnstad, Steinar, Øverby, Harald & Stol, Norvald (2006)
[Conference Lecture]. Event
Kimsås, Andreas; Bjørnstad, Steinar, Øverby, Harald & Tuft, Vegard Larsen (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Nord, Martin; Bjørnstad, Steinar, Tuft, Vegard, Kimsås, Andreas, Hjelme, Dag Roar, Eriksen, Lars Erik, Olsen, Torodd, Øverby, Harald, Sudbø, Aasmund Sveinung, Stol, Norvald, Austad, Oddgeir, Kåråsen, Anne-Grete & Millstein, Geir (2006)
[Report Research]. Telenor R&I
Kimsås, Andreas; Øverby, Harald, Bjørnstad, Steinar & Tuft, Vegard Larsen (2006)
[Conference Lecture]. Event
Øverby, Harald (2006)
[Conference Lecture]. Event
Øverby, Harald (2005)
[Conference Lecture]. Event
Bjørnstad, Steinar & Øverby, Harald (2005)
[Conference Lecture]. Event
Øverby, Harald; Stol, Norvald & Bjørnstad, Steinar (2005)
[Conference Lecture]. Event
Øverby, Harald (2005)
[Conference Lecture]. Event
Bjørnstad, Steinar & Øverby, Harald (2005)
[Conference Lecture]. Event
Øverby, Harald; Stol, Norvald & Bjørnstad, Steinar (2005)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald (2004)
[Conference Lecture]. Event
Undheim, Astrid; Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Moseng, Tor K.; Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald (2004)
[Conference Lecture]. Event
Øverby, Harald (2004)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald (2004)
[Conference Lecture]. Event
Undheim, Astrid; Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Moseng, Tor K.; Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald (2004)
[Conference Lecture]. Event
Øverby, Harald (2004)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2004)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2003)
[Conference Lecture]. Event
We present a teletraffic model of service differentiation in Optical Packet Switched networks. Electronic buffering is applied in order to reduce packet loss rate for low priority traffic. Analytical expressions and simulation results are reported.
Øverby, Harald (2003)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2003)
[Conference Lecture]. Event
This paper presents a formal teletraffic model for service differentiation in optical packet switched networks by utilizing the wavelength domain. Expressions for the time congestion are derived. Simulation results are also reported.
Øverby, Harald (2003)
[Conference Lecture]. Event
This paper presents a novel adaptive service differentiation algorithm for Optical Packet Switched (OPS) networks. Previous research has aimed at presenting algorithms that achieves service differentiation in OPS networks by utilizing the wavelength domain. However, simulations show that these algorithms result inn fluctuating packet loss rate as the system load is varied. The adaptive algorithm proposed here measures the packet loss rate for high priority traffic over a time interval and adjusts the number of wavelength converters reserved for high priority traffic accordingly in order to achieve a constant packet loss rate. However, due to the self-similarity of the Internet traffic, special considerations must be taken into account in order to avoid oscillations in the number of wavelength converters reserved for high priority traffic.
Øverby, Harald & Stol, Norvald (2003)
[Conference Lecture]. Event
We present a teletraffic model of service differentiation in Optical Packet Switched networks. Electronic buffering is applied in order to reduce packet loss rate for low priority traffic. Analytical expressions and simulation results are reported.
Øverby, Harald (2003)
[Conference Lecture]. Event
Øverby, Harald & Stol, Norvald (2003)
[Conference Lecture]. Event
This paper presents a formal teletraffic model for service differentiation in optical packet switched networks by utilizing the wavelength domain. Expressions for the time congestion are derived. Simulation results are also reported.
Øverby, Harald (2003)
[Conference Lecture]. Event
This paper presents a novel adaptive service differentiation algorithm for Optical Packet Switched (OPS) networks. Previous research has aimed at presenting algorithms that achieves service differentiation in OPS networks by utilizing the wavelength domain. However, simulations show that these algorithms result inn fluctuating packet loss rate as the system load is varied. The adaptive algorithm proposed here measures the packet loss rate for high priority traffic over a time interval and adjusts the number of wavelength converters reserved for high priority traffic accordingly in order to achieve a constant packet loss rate. However, due to the self-similarity of the Internet traffic, special considerations must be taken into account in order to avoid oscillations in the number of wavelength converters reserved for high priority traffic.
År | Akademisk institusjon | Grad |
---|---|---|
2005 | Norwegian University of Science and Technology | PhD |
2003 | Norwegian University of Science and Technology | B.Sc. |
2002 | Norwegian University of Science and Technology | Master of Technology |
År | Arbeidsgiver | Tittel |
---|---|---|
2025 - Present | BI Norwegian Business School | Special Advisor AI & Technology |
2023 - 2024 | BI Norwegian Business School | Provost for Research, Learning & Impact |
2022 - 2023 | BI | Provost for Student Learning |
2017 - 2022 | NTNU | Professor |
2013 - 2017 | NTNU | Head of Department |
2010 - 2013 | NTNU | Associate Professor |
2006 - 2010 | NTNU | Research and Education Coordinator |
2005 - 2006 | NTNU | Post.Doc |
2002 - 2005 | NTNU | PhD Student |