Essays about: "End- User Data Control"
Showing result 1 - 5 of 50 essays containing the words End- User Data Control.
-
1. THE IMPACT OF DYNAMIC GAME DIFFICULTY BALANCING ON PLAYER USER EXPERIENCE IN PUZZLE GAMES : A case study
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : This study delves into the relationship between Dynamic Game Difficulty Balance and Game User Experience in the context of puzzle games. The aim of this study was to explore the impact of DGDB on user experience in puzzle games, focusing on player engagement, immersion, and the occurrence of a-ha moment. READ MORE
-
2. Ray-tracing Based Investigations on the Deployment of RISs in Indoor Scenarios
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Reconfigurable intelligence surface (RIS) is a promising candidate technology for future 6G wireless communication systems. In existing communication systems, the network operators are unable to control the propagation environment, which causes significant limitations on communication performance. READ MORE
-
3. Prediction of 5G system latency contribution for 5GC network functions
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : End-to-end delay measurement is deemed crucial for network models at all times as it acts as a pivotal metric of the model’s effectiveness, assists in delineating its performance ceiling, and stimulates further refinement and enhancement. This premise holds true for 5G Core Network (5GC) models as well. READ MORE
-
4. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry
University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakultetenAbstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE
-
5. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE