نتایج جستجو برای: master thesis

تعداد نتایج: 98484  

2005
Sebastian Stein

Background: Quality systems like ISO 9000:2000 and the Capability Maturity Model Integrated (CMMI) [4] describe criteria for good processes [10], but they do not describe a particular instantiation for such a process. This instantiation is up to the organisation implementing the quality system and it is a general perception that such an instantiation always creates bureaucracy and paper work. T...

2014
Thomas Jensen David Pichardie

The now ubiquitous Android platform lacks security features that are considered to be necessary given how easily an application can be uploaded on markets by third-party developers and distributed to a large set of devices. Fortunately, static analysis can help developers, markets and users improve the quality and security of applications at a reasonable cost by being automated. While most exis...

2011
Etter Vincent

We first present our work in machine translation, during which we used aligned sentences to train a neural network to embed n-grams of different languages into an d-dimensional space, such that n-grams that are the translation of each other are close with respect to some metric. Good n-grams to n-grams translation results were achieved, but full sentences translation is still problematic. We re...

2001
Cesar Garcia

Digital television broadcast started in Finland on 27 th of August 2001. A new period in this entertainment field has already begun. Because of the importance of television in the society, the shift between analogue and digital has to be done with the viewers in mind. The User Interface of any application provides the user the means to communicate with the system. Since it is what the viewer ca...

2008
Dominic Meier

Since wireless networks use a shared medium they are exposed to jamming attacks. Such attacks are carried out by an adversary emitting radio frequency signals. They can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. However, unless the adversary has unlimited capacities, it cannot jam all communicati...

2003
WANG YU

ii ACKNOWLEDGEMENTS A number of people have been involved in my work and I wish to express my warmest gratitude to everyone who supported and help me in different ways. First of all I am deeply grateful to my husband Jianlin Shi. Without his understanding, valuable advice and patience, my thesis could not have been attempted and completed. I want to express my heartfelt thanks to my supervisor ...

2009
Andreas Hoheisel

iii Statement I hereby declare, that the work presented in this master thesis is my own work and that to the best of my knowledge it is original, except where indicated by references to other authors. Erklärung Hiermit versichere ich, dass ich meine Master Thesis selber verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel benutzt, sowie Zitate kenntlich gemacht habe.

2003
Martin Mach

In the last years, formal verification has received a proper attention because computer applications get more and more liability in human society. The most important problem is the big a size of checked system that it doesn’t fit into memory, this problem is usually called state explosion. In the thesis, there is suggested a new, memory efficient automata representation based on behavior protoc...

2008
Jihyun Lee Dan Hyung Lee Jongmoon Baik

The problem of satisfying a desired level of quality attributes has been researched in the software architecture analysis domain. Architecture tradeoff analysis methods have been studied in order to examine whether an architecture meets the system quality and to know where the quality tradeoffs exist. Even though the Architecture Tradeoff Analysis Method (ATAM) provides a basic understanding of...

2007
Jeroen P. Prins

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content, so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید