Search for dissertations about: "natural sciences computer and information science computer science"

Showing result 1 - 5 of 1983 swedish dissertations containing the words natural sciences computer and information science computer science.

  1. 1. Lock-free Concurrent Search

    Author : Bapi Chatterjee; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Wait-free; Help-aware; Non-blocking; Concurrency; Linearizability; Lock-based; Lock-free-kD-tree; Amortized Complexity; Data Structure; Binary Search Tree; Blocking; Search; Concurrent; kD-tree; Linked-list; Lock-free; Range Search; Language-portable; Help-optimal; Nearest Neighbour Search; Linearizable; Synchronization;

    Abstract : The contemporary computers typically consist of multiple computing cores with high compute power. Such computers make excellent concurrent asynchronous shared memory system. READ MORE

  2. 2. Advancing Automation in Digital Forensic Investigations

    Author : Irvin Homem; Panagiotis Papapetrou; Fredrik Blix; Indre Žliobaitė; Stockholms universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Digital Forensics; Machine Learning; Computer Forensics; Network Forensics; Predictive Modelling; Distributed Systems; Mobile Devices; Mobile Forensics; Memory Forensics; Android; Semantic Web; Hypervisors; Virtualization; Remote Acquisition; Evidence Analysis; Correlation; P2P; Bittorrent; Computer and Systems Sciences; data- och systemvetenskap;

    Abstract : Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. READ MORE

  3. 3. Exploring C2 Capability and Effectiveness in Challenging Situations : Interorganizational Crisis Management, Military Operations and Cyber Defence

    Author : Magdalena Granåsen; Niklas Hallberg; Henrik Eriksson; Henrik Tehler; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES;

    Abstract : Modern societies are affected by various threats and hazards, including natural disasters, cyber-attacks, extreme weather events and inter-state conflicts. Managing these challenging situations requires immediate actions, suspension of ordinary procedures, decision making under uncertainty and coordinated action. READ MORE

  4. 4. Computer Science Project Courses : Contrasting Students’ Experiences with Teachers’ Expectations

    Author : Mattias Wiggberg; Mats Daniels; Lecia J. Barker; Tony Clear; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; computer science education; computer science student projects; computer science projects; computer science education research; phenomenography; learning; higher education; communities of practice; capstone projects; constructivism; Computer science; Datavetenskap; Datavetenskap med inriktning mot datavetenskapens didaktik; Computer Science with specialization in Computer Science Education Research;

    Abstract : Including small or large project courses is widely recognized as important in preparing computer science students for a professional career. Typical examples are the capstone courses, which often are seen as the jewel in the crown since this is where students will bring their previous knowledge and skills together to show mastery of their craft. READ MORE

  5. 5. Secure and Privacy-Preserving Cloud-Assisted Computing

    Author : Georgia Tsaloli; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; differential privacy; decentralization; verifiability; privacy-preservation; secure aggregation; secret sharing; cloud computing; privacy;

    Abstract : Smart devices such as smartphones, wearables, and smart appliances collect significant amounts of data and transmit them over the network forming the Internet of Things (IoT). Many applications in our daily lives (e.g., health, smart grid, traffic monitoring) involve IoT devices that often have low computational capabilities. READ MORE