Essays about: "End User Computation"

Showing result 1 - 5 of 15 essays containing the words End User Computation.

  1. 1. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry

    University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakulteten

    Author : Adam Fager; [2023]
    Keywords : Cloud-Based Shadow IT; Shadow IT; Swedish Tech Sector; Data Privacy; Managers; Employees; End User Computation; Workaround; Personal IT; Third-Party Access;

    Abstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE

  2. 2. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE

  3. 3. Belief Rule-Based Workload Orchestration in Multi-access Edge Computing

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mohammad Newaj Jamil; [2022]
    Keywords : Multi-access Edge Computing MEC ; Task Offloading; Workload Orchestrator; Belief Rule Base BRB ; Performance Evaluation;

    Abstract : Multi-access Edge Computing (MEC) is a standard network architecture of edge computing, which is proposed to handle tremendous computation demands of emerging resource-intensive and latency-sensitive applications and services and accommodate Quality of Service (QoS) requirements for ever-growing users through computation offloading. Since the demand of end-users is unknown in a rapidly changing dynamic environment, processing offloaded tasks in a non-optimal server can deteriorate QoS due to high latency and increasing task failures. READ MORE

  4. 4. Providing continuous edge computation service delivery and minimizing application state divergence

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Axel Alvarsson; [2022]
    Keywords : Edge Computation; State Migration; Service Continuity; Edge; State Transfer;

    Abstract : Edge Computation aims to bring the functionality of hyperscale datacenters closer to the end-user as to offer reliable low-latency communication through distributed compute power. With the ongoing rise of 5G standalone promis-ing low latency and high capacity, the possibility of running user real-time applications in a distributed setting has never been closer. READ MORE

  5. 5. Positioning in Non-Terrestrial Networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Soha Emara; [2021]
    Keywords : positioning; 5G; satellite; NTN; Technology and Engineering;

    Abstract : In 5G communications, Non-terrestrial Network (NTN) is envisioned to complement Terrestrial Network (TN) to increase network availability, scalability and continuity. Positioning of User Equipment (UE) is critical for the operation of NTN. Currently, NTN uses Global Navigation Satellite System (GNSS) for positioning. READ MORE