Search for dissertations about: "Datalogi"
Showing result 6 - 10 of 643 swedish dissertations containing the word Datalogi.
-
6. Automatic Extraction of Program Models for Formal Software Verification
Abstract : In this thesis we present a study of the generation of abstract program models from programs in real-world programming languages that are employed in the formal verification of software. The thesis is divided into three parts, which cover distinct types of software systems, programming languages, verification scenarios, program models and properties. READ MORE
-
7. Lower Bounds and Trade-offs in Proof Complexity
Abstract : Propositional proof complexity is a field in theoretical computer science that analyses the resources needed to prove statements. In this thesis, we are concerned about the length of proofs and trade-offs between different resources, such as length and space. READ MORE
-
8. Towards a Trustworthy Stack: Formal Verification of Low-Level Hardware and Software
Abstract : Computer systems, consisting of hardware and software, have gained significant importance in the digitalised world. These computer systems rely on critical components to provide core functionalities and handle sensitive data. READ MORE
-
9. Privacy Analysis and Protocols for Decentralized Online Social Networks
Abstract : Decentralized Online Social Networks (DOSNs) are evolving as a promising approach to mitigate design-inherent privacy flaws of logically centralized services such as Facebook, Google+ or Twitter. Common approaches to implement a DOSN build upon a peer-to-peer (P2P) architecture in order to avoid the central aggregation of sensitive user data at one provider-controlled location. READ MORE
-
10. Privacy Issues in Decentralized Online Social Networks and other Decentralized Systems
Abstract : Popular Online Social Networks (OSNs), such as Facebook or Twitter, are logically centralized systems. The massive information aggregation of sensitive personal data at the central providers of these services is an inherent threat to the privacy of the users. READ MORE