Search for dissertations about: "execution"

Showing result 11 - 15 of 677 swedish dissertations containing the word execution.

  1. 11. Crucifixion in Antiquity : An Inquiry into the Background of the New Testament Terminology of Crucifixion

    Author : Gunnar Samuelsson; Göteborgs universitet; []
    Keywords : HUMANIORA; HUMANITIES; HUMANIORA; HUMANITIES; crucifixion; cross; death of Jesus; Bible; New Testament; church; Christianity; philology; semantics; Jesus; execution; death sentence; impaling; suspension punishment; Golgotha; Calvary; ancient language; classical languages; Classical Greek; Latin; Hebrew Aramaic; ancient Greece; Roman empire; Roman world; Jerusalem;

    Abstract : This study investigates the philological aspects of how ancient Greek, Latin and Hebrew/Aramaic texts, including the New Testament, depict the practice of punishment by crucifixion. A survey of the ancient text material shows that there has been a too narrow view of the “crucifixion” terminology. READ MORE

  2. 12. Manual Motor Development in Infancy : Execution and Observation of Actions

    Author : Therese Ljunghammar Ekberg; Gustaf Gredebäck; Claes von Hofsten; Jeffrey J. Lockman; Uppsala universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Infancy; Motor development; Reaching; Actions; Motor prediction; Prospective motor control; Social cognition; Stereopsis; Mirror neuron system; Mu rhythm; Motor impairment; Autism Spectrum Disorder; High-risk siblings; Psychology; Psykologi;

    Abstract : Of all motor skills, manual reaching might be the one ability that matters most for infants’ perceptual, cognitive and social development. Reaching allows infants to learn about object properties, but also gives opportunities for socializing with others. READ MORE

  3. 13. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

    Author : Anum Khurshid; Shahid Raza; Thiemo Voigt; Christian Gehrmann; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Internet of Things; IoT device security; Trusted Execution Environments; Trusted Platform Module; TPM 2.0; IoT Certification; Assurance; TrustZone-M; TEE; Secure software updates; X.509;

    Abstract : The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT security through recent laws and regulations. A major part of IoT systems comprises of resource-constrained devices, with less margin in memory and computation capabilities to embed sophisticated security solutions. READ MORE

  4. 14. Introducing a Memory Efficient Execution Model in a Tool-Suite for Real-Time Systems

    Author : Kaj Hänninen; Mikael Nolin; Christer Norström; Jukka Mäki-Turja; Ola Redell; Mälardalens högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Real-Time Systems; Execution Models; Computer science; Datavetenskap; Datavetenskap;

    Abstract : This thesis shows how development of embedded real-time systems can be made more efficient by introduction of an memory efficient execution model in a commercial development suite. To identify the need of additional support for execution models in development tools, the thesis investigate by a series of interviews, the common requirements in development of industrial embedded real-time systems. READ MORE

  5. 15. Proving Safety and Security of Binary Programs

    Author : Andreas Lindner; Roberto Guanciale; Mads Dam; Tamara Rezk; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Binary Code; Binary Analysis; Formal Verification; Model-Based Testing; Theorem Proving; HOL4; Intermediate Language; Instruction Set Architectures; ISA; Observational Models; Symbolic Execution; Weakest-Precondition; Execution Time Analysis; binärkod; binärkodsanalys; formell verifiering; modellbaserad testning; satsbevisning; HOL4; mellankod; instruktionsuppsättningar; ISA; observationsmodeller; symbolisk exekvering; minst restriktiva villkoret; analys av övre tidsgräns; Datalogi; Computer Science;

    Abstract : With the increasing ubiquity of computing devices, their correct and secure operation is of growing importance. In particular, critical components that provide core functionalities or process sensitive data have to operate as intended. READ MORE