Essays about: "crafting"
Showing result 11 - 15 of 79 essays containing the word crafting.
-
11. Audhumbla and Heidrun beyond gods and mead : Species selection for production of leather in Late Iron Age Scandinavia
University essay from Uppsala universitet/ArkeologiAbstract : Leather has been one of the most common crafting materials in human history. With its incredible versatility it has been used for clothes, shelter, books, armour, containers, decoration, and everything in between. READ MORE
-
12. Applications of Formal Explanations in ML
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The most performant Machine Learning (ML) classifiers have been labeled black-boxes due to the complexity of their decision process. eXplainable Artificial Intelligence (XAI) methods aim to alleviate this issue by crafting an interpretable explanation for a models prediction. READ MORE
-
13. An analysis and comparison of the Native mobile application versus the Progressive web application
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Det här arbetet utforskar jämförelsen mellan progressiva webbapplikationer (PWA) och native mobila applikationer. Arbetet belyser ett problem som är aktuellt idag och kommer att vara ännu mer så i närmaste framtid på grund av den ständiga teknikutvecklingen och människans beroende av mobila applikationer. READ MORE
-
14. Helping Children Becoming Digital Creators Through Design
University essay from Göteborgs universitet/HDK-Valand - Högskolan för konst och designAbstract : In 2022, acting in the digital world has become a large part of children’s culture in the west. There are plenty of big companies that approach children as customers and consumers by producing digital entertainment content to tie them to their brands. READ MORE
-
15. ROP-chain generation using Genetic Programming : GENROP
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. READ MORE