Essays about: "Heterogeneous system"
Showing result 1 - 5 of 255 essays containing the words Heterogeneous system.
-
1. Trädplantering i den hårdgjorda staden : utmaningar och lösningsalternativ
University essay from SLU/Dept. of Landscape Architecture, Planning and Management (from 130101)Abstract : Träd är viktiga delar av våra städer. De bidrar med många ekosystemtjänster, som klimatreglering, dagvattenhantering och positiva hälsoeffekter. De är också viktiga identitetsskapande element. READ MORE
-
2. Control system and simplified timesynchronization for heterogenous IoT systems with medium time requirements
University essay from KTH/Hälsoinformatik och logistikAbstract : The company QTPIE conducts research on drivers and their unconscious reactions when driving. To help, they use smart devices that today must be individually handled at the start and end of a run, and have individually set timestamps, which can lead to differences between the units when data is entered and collation of the units' data after a run. READ MORE
-
3. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE
-
4. Code Synthesis for Heterogeneous Platforms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Heterogeneous platforms, systems with both general-purpose processors and task-specific hardware, are largely used in industry to increase efficiency, but the heterogeneity also increases the difficulty of design and verification. We often need to wait for the completion of all the modules to know whether the functionality of the design is correct or not, which can cause costly and tedious design iteration cycles. READ MORE
-
5. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE