Search for dissertations about: "Department of Computer Science and Electrical Engineering."
Showing result 1 - 5 of 19 swedish dissertations containing the words Department of Computer Science and Electrical Engineering..
-
1. Advancing Automation in Digital Forensic Investigations
Abstract : Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. READ MORE
-
2. Towards Increased Use of Discrete-Event Simulation for Hospital Resource Planning
Abstract : Health care systems in many countries are experiencing a growing demand while their resources remain limited. The discrepancy between demand and capacity creates many problems – long waiting times for treatment, overcrowding in hospital wards, high workload, etc. READ MORE
-
3. Aspect-Oriented Business Process Management
Abstract : Separation of concerns has long been considered an effective and efficient strategy to deal with complexity in information systems.One sort of concern, like security and privacy, crosses over other concerns in a system. Such concerns are called cross-cutting concerns. READ MORE
-
4. Implementation and real-world evaluation of routing protocols for wireless ad hoc networks
Abstract : A wireless ad hoc network consists of a number of mobile nodes that temporarily form a dynamic infrastructure-less network. To enable communication between nodes that do not have direct radio contact, each node must function as a wireless router and potentially forward data traffic on behalf of the others. READ MORE
-
5. Practical, Flexible programming with Information Flow Control
Abstract : Mainstream mechanisms for protection of information security are not adequate. Most vulnerabilities today do not arise from deficiencies in network security or encryption mechanisms, but from software that fails to provide adequate protection for the information it handles. READ MORE