Essays about: "Hardware access"
Showing result 1 - 5 of 237 essays containing the words Hardware access.
-
1. A comparative performance analysis of Fast Fourier Transformation and Gerstner waves
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: As time moves on hardware is able to tackle heavier and more complex computations in real-time systems. This means that more realistic and stylistic environments can be computed. One of these environments is the ocean. READ MORE
-
2. Subjective Tests for Quality of Experience in Streamed Virtual Reality Games
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : VR gaming is an emerging market with relatively new technology when compared to PC and console gaming. Streamed VR gaming is when the VR game is being streamed from another device to the VR headset. READ MORE
-
3. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE
-
4. Impact of fixed-rate fingerprinting defense on cloud gaming experience
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Cloud gaming has emerged as a popular solution to meet the increasing hardware de-mands of modern video games, allowing players with dated or non-sufficient hardwareto access high-quality gaming experiences. However, the growing reliance on cloud ser-vices has led to heightened concerns regarding user privacy and the risk of fingerprintingattacks. READ MORE
-
5. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE