Search for dissertations about: "guarantees"

Showing result 21 - 25 of 287 swedish dissertations containing the word guarantees.

  1. 21. Reliable and deterministic network services

    Author : Florian-Daniel Otel; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; queuing delay guarantees; service curve; constraint-based routing; TCP; network security; arrival curve; network failure recovery; traffic engineering; network calculus; traffic envelope;

    Abstract : In a post Internet bubble economic environment the obvious lack of any disruptive new technologies that could give new impetus to network growth (as, for example, experienced after the appearance of the Web) lead to a trivialization of network services: Aside grass-roots, semi-subterranean applications like file sharing, entertainment content swapping and on-line gaming, it can be argued that network services are presently used in a manner not very different than a decade ago. In this respect, one of the factors that can be identified as limiting further development is the perceived lack of guarantees with regard to network services. READ MORE

  2. 22. Architectures and Protocols for Performance Improvements of Real-Time Networks

    Author : Kristina Kunert; Magnus Jonsson; Elisabeth Uhlemann; Eduardo Tovar; Högskolan i Halmstad; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Real-time communication; predictable deadline guarantees; real-time scheduling analysis; timing analysis; admission control; deterministic medium access; MAC; Quality of Service parameters; reliability; redundancy; retransmission scheme; ARQ; truncated ARQ; Automatic Repeat Request; wireless networks; IEEE 802.11; IEEE 802.15.4; fibre-optic networks; AWG; multichannel networks; industrial communications; embedded systems; Computer engineering; Datorteknik;

    Abstract : When designing architectures and protocols for data traffic requiring real-time services, one of the major design goals is to guarantee that traffic deadlines can be met. However, many real-time applications also have additional requirements such as high throughput, high reliability, or energy efficiency. READ MORE

  3. 23. Guaranteeing Generalization via Measures of Information

    Author : Fredrik Hellström; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; PAC-Bayes; statistical learning; information theory; Machine learning; neural networks.; generalization;

    Abstract : During the past decade, machine learning techniques have achieved impressive results in a number of domains. Many of the success stories have made use of deep neural networks, a class of functions that boasts high complexity. Classical results that mathematically guarantee that a learning algorithm generalizes, i.e. READ MORE

  4. 24. Outsourcing Computations to a Cloud That You Don't Trust

    Author : Georgia Tsaloli; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; differential privacy; function secret sharing; homomorphic secret sharing; verifiable computation; privacy-preservation; public verifiability;

    Abstract : In many application scenarios, data need to be collected, stored and processed. Often sensitive data are collected from IoT devices, which are constrained regarding their resources, and, thus, remote, untrusted cloud servers are required to perform the computations. READ MORE

  5. 25. Flexible Information-Flow Control

    Author : Daniel Schoepe; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; software security; information-flow control; program verification; language-based security;

    Abstract : As more and more sensitive data is handled by software, its trustworthiness becomes an increasingly important concern. This thesis presents work on ensuring that information processed by computing systems is not disclosed to third parties without the user's permission; i.e. to prevent unwanted flows of information. READ MORE