Advanced search
Showing result 1 - 5 of 6 essays matching the above criteria.
-
1. Smart task logging : Prediction of tasks for timesheets with machine learning
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Every day most people are using applications and services that are utilising machine learning, in some way, without even knowing it. Some of these applications and services could, for example, be Google’s search engine, Netflix’s recommendations, or Spotify’s music tips. READ MORE
-
2. Dialect representation : Language varieties in The Witcher 3: The Wild Hunt
University essay from Högskolan Väst/Avd för utbildningsvetenskap och språkAbstract : This study examines the dialect representation in CD PROJEKT RED's video game The Witcher: Wild Hunt. The study intends to contribute to an already narrow sociolinguistic field of research of how dialects are represented in video games, more precisely role-playing games. READ MORE
-
3. Zonerat skogsbruk - en möjlighet för Sverige
University essay from SLU/Dept. of Forest Ecology and ManagementAbstract : Trakthyggesbruk är det skogsbruk som i över ett halvt sekel dominerat i Sverige. På senare år har dock detta skogsbruk ifrågasatts gällande främst den naturhänsyn som det lämnar samt att trakthyggesbruket bedrivs på i princip all skogsmark som brukas. READ MORE
-
4. Debug register rootkits : A study of malicious use of the IA-32 debug registers
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any scanning tools. It exploits the debug registers in Intel’s IA-32 processor architecture. READ MORE
-
5. Debug register rootkits : A study of malicious use of the IA-32 debug registers
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any scanning tools. It exploits the debug registers in Intel’s IA-32 processor architecture. READ MORE