Search for dissertations about: "tcs"

Showing result 1 - 5 of 69 swedish dissertations containing the word tcs.

  1. 1. On difficult topics in theoretical computer science education

    Author : Emma Enström; Olle Bälter; Arnold Neville Pears; KTH; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES;

    Abstract : This thesis primarily reports on an action research project that has been conducted on a course in theoretical computer science (TCS). The course is called Algorithms, data structures, and complexity (ADC) and is given at KTH Royal Institute of Technology in Stockholm, Sweden. READ MORE

  2. 2. Algorithmic Verification Techniques for Mobile Code

    Author : Irem Aktug; Dilian Gurov; Mads Dam; Ulfar Erlingsson; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Verification; Mobile Code Security; Reference Monitoring; Maximal Models; Compositional Verification; Theoretical computer science; Teoretisk datalogi;

    Abstract : Modern computing platforms strive to support mobile code without putting system security at stake. These platforms can be viewed as open systems, as the mobile code adds new components to the running system. Establishing that such platforms function correctly can  be divided into two steps. READ MORE

  3. 3. Conditional Inapproximability and Limited Independence

    Author : Per Austrin; Johan Håstad; Ryan O'Donnell; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer science; Datalogi;

    Abstract : Understanding the theoretical limitations of efficient computation is one of the most fundamental open problems of modern mathematics. This thesis studies the approximability of intractable optimization problems. In particular, we study so-called Max CSP problems. READ MORE

  4. 4. Logics for Information Flow Security:From Specification to Verification

    Author : Musard Balliu; Mads Dam; David Naumann; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Computer Science; Datalogi;

    Abstract : Software is becoming  increasingly  ubiquitous and today we find software running everywhere. There is software driving our favorite  game  application or  inside the web portal we use to read the morning  news, and   when we book a vacation. READ MORE

  5. 5. Social Networks and Privacy

    Author : Oleksandr Bodriagov; Sonja Buchegger; Melek Ӧnen; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; social networks; privacy; decentralized; encryption-based access control; Computer Science; Datalogi;

    Abstract : Centralized online social networks pose a threat to their users’ privacy as social network providers have unlimited access to users’ data. Decentralized social networks address this problem by getting rid of the provider and giving control to the users themselves, meaning that only the end-users themselves should be able to control access of other parties to their data. READ MORE