Essays about: "Kompilering"
Showing result 1 - 5 of 24 essays containing the word Kompilering.
-
1. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE
-
2. Functional Programming Languages and the JVM : Comparing Functional Language Compilation Techniques for the JVM
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Because of its security, high availability, and automatic memory management, the JVM (Java Virtual Machine) is a desirable execution environment. However, since the JVM was originally made for Java, which is an objectoriented language, it is hard for languages with other paradigms to run on it. READ MORE
-
3. Continuous Integration for Embedded Software with Modular Firmware Architecture
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Continuous Integration (CI) techniques are widely adopted in web and application development but have received limited attention in the embedded software domain. This thesis investigates the application of CI techniques in embedded software development through a case study at Cobolt AB, a company specializing in optoelectronics. READ MORE
-
4. Preserving the Mental Map when Visualizing Dynamic Graphs : An Approach for Intermediate Representations in the C2 Java Compiler
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Graphs are powerful data structures that are widely used to represent complex forms of information. One area in which graphs are successfully being used is within compiler engineering, where a program under compilation can be represented as a graph that changes as the program is being compiled. READ MORE
-
5. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE