Essays about: "Computer Science thesis examples"
Showing result 11 - 15 of 17 essays containing the words Computer Science thesis examples.
-
11. 3D Surround Sound Application for Game Environments
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : This report covers the creation and implementation of a 3D audio application using FMOD Ex API. The report will also cover a walkthrough of the basic principles of 3D and surround audio, examples of other uses of 3D audio, a comparison between available technologies today, both software and hardware and finally the result of the implementation of the 3D sound environment software, both server and client. READ MORE
-
12. From 2001 A Space Odyssey to Minority Report : Reflections of Imagining Future on Science Fiction
University essay from Blekinge Tekniska Högskola/Sektionen för planering och mediedesignAbstract : My Bachelor’s Thesis is a comparative analysis that identifies a paradigm shift based on how imagining and portraying futuristic technology and human - computer (or machine) interaction within science fiction works and explore how they depict the technology and the future thinking of their own era. I use two very popular and influential works from two different eras: 2001 A Space Odyssey from the late 1960s and Minority Report from the early 2000s. READ MORE
-
13. Automated Model-Based Reliability Prediction and Fault Tree Analysis
University essay from Institutionen för datavetenskapAbstract : This work was undertaken as a final year project in Computer Engineering, within the Department of Computer and Information Science at Linköping University. At the Department of Computer and Information Science, work oriented at testing and analyzing applications is developed to provide solution approaches to problems that arise in system product development. READ MORE
-
14. Arm-P : Almost Reliable Multicast protocol
University essay from Institutionen för datavetenskapAbstract : Distribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource. READ MORE
-
15. Cryptographic Key Masking During Run-Time
University essay from Institutionen för teknik och naturvetenskapAbstract : Many of the products commercially available today contain some form of encrypted or hashed data. It can involve DRM protection, licenses and certificates, signatures or identification information. Regardless of what the data is intended for, it is protected for a reason and may be worth a great deal of money to the owner. READ MORE