Sökning: "instantiation"
Visar resultat 6 - 10 av 39 avhandlingar innehållade ordet instantiation.
6. Cybersecurity Incident Response : A Socio-Technical Approach
Sammanfattning : This thesis examines the cybersecurity incident response problem using a socio-technical approach. The motivation of this work is the need to bridge the knowledge and practise gap that exists because of the increasing complexity of cybersecurity threats and our limited capability of applying cybersecurity controls necessary to adequately respond to these threats. LÄS MER
7. Transformation through Integration : An Activity Theoretical Analysis of School Development as Integration of Child Care Institutions and the Elementary School
Sammanfattning : This study analyzes an attempt at integration of a pre-school class, a leisure-time center and an elementary school in Sweden. The integration was organized in the form of Vertical Track which implies a successive development of groups comprising children between six and twelve years old, pre-school teachers, recreation pedagogues, and schoolteachers. LÄS MER
8. Incremental scanning and token-based editing
Sammanfattning : A primary goal with this thesis work has been to investigate the consequences of a token-based program representation. Among the results which are presented here are an incremental scanning algorithm together with a token-based syntax sensitive editing approach for program editing. LÄS MER
9. Transformation through Integration
Sammanfattning : Abstract This study analyzes an attempt at integration of a pre-school class, a leisure-time center and an elementary school in Sweden. The integration was organized in the form of Vertical Track which implies a successive development of groups comprising children between six and twelve years old, pre-school teachers, recreation pedagogues, and schoolteachers. LÄS MER
10. Outsourcing Computations to a Cloud That You Don't Trust
Sammanfattning : In many application scenarios, data need to be collected, stored and processed. Often sensitive data are collected from IoT devices, which are constrained regarding their resources, and, thus, remote, untrusted cloud servers are required to perform the computations. LÄS MER