Essays about: "Control flow graph"

Showing result 1 - 5 of 18 essays containing the words Control flow graph.

  1. 1. Characterizing Bitcoin Use For Illicit Activities

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Hampus Rosenquist; [2023]
    Keywords : Bitcoin; illicit; characterization; bitcoin abuse; crypto; cryptocurrencies; cryptocurrency; Bitcoin; illegalt; illegal; olagligt; karaktärisering; bitcoinmissbruk; krypto; kryptovaluta; kryptovalutor;

    Abstract : Bitcoin's decentralized nature enables reasonably anonymous exchange of money outside of the authorities' control. This has led to Bitcoin being popular for various illegal activities, including scams, ransomware attacks, money laundering, black markets, etc. READ MORE

  2. 2. Control Aid Implementation -Modelling and simulation of triple extruder-

    University essay from Lunds universitet/Kemiteknik (CI)

    Author : Karl Langsér; [2023]
    Keywords : Machine Learning; Extruder; Modelling; Simulation; Extreme learning machine; Chemical engineering; Technology and Engineering;

    Abstract : In the production of their High Voltage Direct Current Cables (HVDC) and High Voltage Alternating Current Cables (HVAC), NKT uses triple extruders to create layers of insulation and semi-conduction. A model to predict the effect of extruder inputs on the cable’s insulation and semi-conducting layers has been created and trained to predict the extruder in discrete time. READ MORE

  3. 3. Highway Traffic Forecasting with the Diffusion Model : An Image-Generation Based Approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pengnan Chi; [2023]
    Keywords : Diffusion model; Traffic forecasting; Generative model; Image processing; Spatial temporal modelling; Diffusionsmodell; Trafikprognos; Generativ modell; Bildbehandling; Rumsligtemporal modellering;

    Abstract : Forecasting of highway traffic is a common practice for real traffic information system, and is of vital importance to traffic management and control on highways. As a typical time-series forecasting task, we want to propose a deep learning model to map the historical sensory traffic values (e.g., speed, flow) to future traffic forecasts. READ MORE

  4. 4. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE

  5. 5. Transforming Models of Computation to Automotive Component Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mehmet Onur Aybek; [2020]
    Keywords : ;

    Abstract : Due to the performance and capability enhancements of computer-based ser-vices in the last couple of decades, software has started to control and operate most of the functionalities in a vehicular system and offered a faster devel-opment process with the flexibility of managing more advanced computer- controlled functionality. Nevertheless, the size of the software, complexity, and safety verification issues have dramatically increased with this enormous workload as well. READ MORE