Search for dissertations about: "execution"
Showing result 11 - 15 of 677 swedish dissertations containing the word execution.
-
11. Crucifixion in Antiquity : An Inquiry into the Background of the New Testament Terminology of Crucifixion
Abstract : This study investigates the philological aspects of how ancient Greek, Latin and Hebrew/Aramaic texts, including the New Testament, depict the practice of punishment by crucifixion. A survey of the ancient text material shows that there has been a too narrow view of the “crucifixion” terminology. READ MORE
-
12. Manual Motor Development in Infancy : Execution and Observation of Actions
Abstract : Of all motor skills, manual reaching might be the one ability that matters most for infants’ perceptual, cognitive and social development. Reaching allows infants to learn about object properties, but also gives opportunities for socializing with others. READ MORE
-
13. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification
Abstract : The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT security through recent laws and regulations. A major part of IoT systems comprises of resource-constrained devices, with less margin in memory and computation capabilities to embed sophisticated security solutions. READ MORE
-
14. Introducing a Memory Efficient Execution Model in a Tool-Suite for Real-Time Systems
Abstract : This thesis shows how development of embedded real-time systems can be made more efficient by introduction of an memory efficient execution model in a commercial development suite. To identify the need of additional support for execution models in development tools, the thesis investigate by a series of interviews, the common requirements in development of industrial embedded real-time systems. READ MORE
-
15. Proving Safety and Security of Binary Programs
Abstract : With the increasing ubiquity of computing devices, their correct and secure operation is of growing importance. In particular, critical components that provide core functionalities or process sensitive data have to operate as intended. READ MORE