Search for dissertations about: "evaluate information security"
Showing result 21 - 25 of 65 swedish dissertations containing the words evaluate information security.
-
21. Performance and Security Analysis for GPU-Based Applications
Abstract : Graphics Processing Units (GPUs) are becoming more and more prevalent in general-purpose computing. GPUs are used in areas from embedded systems to super-computing. READ MORE
-
22. Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints
Abstract : The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and underutilization of the radio spectrum. To improve the radio spectrum utilization, CRN technology allows the coexistence of licensed and unlicensed systems over the same spectrum. READ MORE
-
23. Towards Real-World Federated Learning: Empirical Studies in the Domain of Embedded Systems
Abstract : Context: Artificial intelligence (AI) has led a new phase of technical revolution and industrial development around the world since the twenty-first century, revolutionizing the way of production. Artificial intelligence (AI), an emerging information technology, is thriving, and AI application technologies are gaining traction, particularly in professional services such as healthcare, education, finance, security, etc. READ MORE
-
24. Synchronous and Concurrent Transmissions for Consensus in Low-Power Wireless
Abstract : With the emergence of the Internet of Things, autonomous vehicles and the Industry 4.0, the need for dependable yet adaptive network protocols is arising. Many of these applications build their operations on distributed consensus. For example, UAVs agree on maneuvers to execute, and industrial systems agree on set-points for actuators. READ MORE
-
25. Cooperative Privacy and Security for Mobile Systems
Abstract : The growing popularity of powerful mobile devices, along with increased computation and storage of computing infrastructure, opened possibilities for versatile mobile system applications. Users, leveraging sensing capabilities of the devices, can collect rich data and exchange the data with diverse Service Providers (SPs) or their close neighboring devices. READ MORE