Avancerad sökning

Hittade 3 avhandlingar som matchar ovanstående sökkriterier.

  1. 1. Formally Assured Intelligent Systems for Enhanced Ambient Assisted Living Support

    Författare :Ashalatha Kunnappilly; Cristina Seceleanu; Maria Lindén; Elena Troubitsyna; Mälardalens högskola; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Computer Science; datavetenskap;

    Sammanfattning : Ambient Assisted Living (AAL) solutions are aimed to assist the elderly in their independent and safe living. During the last decade, the AAL field has witnessed a significant development due to advancements in Information and Communication Technologies, Ubiquitous Computing and Internet of Things. LÄS MER

  2. 2. Optimizing Fault Tolerance for Real-Time Systems

    Författare :Dimitar Nikolov; Erik Larsson; Elena A. Troubitsyna; Linköpings universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES;

    Sammanfattning : For the vast majority of computer systems correct operation is defined as producing the correct result within a time constraint (deadline). We refer to such computer systems as real-time systems (RTSs). LÄS MER

  3. 3. Generating Optimized and Secure Binary Code

    Författare :Rodothea Myrsini Tsoupidi; Elena Troubitsyna; Panagiotis Papadimitratos; Fernando Magno Quintão Pereira; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; constraint programming; code optimization; secure compilation; side-channel attacks; code-reuse attacks; software security; villkorsprogrammering; kodoptimering; säker kompilering; sidokanalsattacker; kodåteranvändningsattacker; mjukvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. LÄS MER