Essays about: "Runtime monitor"

Showing result 1 - 5 of 12 essays containing the words Runtime monitor.

  1. 1. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Victor Mertala; Nordin Christopher; [2024]
    Keywords : CRYSTAL Framework; Tiny Twin; Tiny Digital Twin; Rebeca; Timed Rebeca; monitor; cyber attacks;

    Abstract : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. READ MORE

  2. 2. Challenges in Specifying Safety-Critical Systems with AI-Components

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Iswarya Malleswaran; Shruthi Dinakaran; [2023-09-26]
    Keywords : Software engineering; Requirement engineering; Specification; Safety; Computer Science; Engineering; Machine learning; Deep learning; Runtime monitor; Data Selection; Data Collection;

    Abstract : Safety is an important feature in automotive industry. Safety critical system such as Advanced Driver Assistance System (ADAS) and Autonomous Driving (AD) follows certain processes and procedures in order to perform the desired function safely. READ MORE

  3. 3. Behavioural comparison of test and field executions of video games

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chloé Marie Porion; [2023]
    Keywords : Software Testing; Field Monitoring; Test Monitoring; Video Games; Video Game Modding; Mjukvarutestning; Fältövervakning; Testövervakning; Videospel; Videospel Modding;

    Abstract : Software developers write tests to ensure that their application behaves as intended. However, the behaviour of an application in production may deviate from the behaviours that are tested. This difference between test and field executions is rarely assessed in practice. READ MORE

  4. 4. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE

  5. 5. Analysing Aliasing in Java Applications

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Björn Berggren; [2020]
    Keywords : ;

    Abstract : Aliasing refers to the possibility of having multiple references to the same memory location and is a cornerstone concept in the imperative programming paradigm. As applications grow large, it is hard for programmers to keep track of all places in the code where they employ aliasing, possibly resulting in hard-to-predict runtime errors. READ MORE