Essays about: "Master thesis algorithms"
Showing result 16 - 20 of 274 essays containing the words Master thesis algorithms.
-
16. Multi-robot coordination and planning with human-in-the-loop under STL specifications : Centralized and distributed frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Recent urbanization and industrialization have brought tremendous pressure and challenges to modern autonomous systems. When considering multiple complex tasks, cooperation and coordination between multiple agents can improve efficiency in a system. READ MORE
-
17. Amplifying heap overflow vulnerability detection with reinforcement learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE
-
18. Quantum Algorithms for Feature Selection and Compressed Feature Representation of Data
University essay from KTH/FysikAbstract : Quantum computing has emerged as a new field that may have the potential to revolutionize the landscape of information processing and computational power, although physically constructing quantum hardware has proven difficult,and quantum computers in the current Noisy Intermediate Scale Quantum (NISQ) era are error prone and limited in the number of qubits they contain.A sub-field within quantum algorithms research which holds potential for the NISQ era, and which has seen increasing activity in recent years, is quantum machine learning, where researchers apply approaches from classical machine learning to quantum computing algorithms and explore the interplay between the two. READ MORE
-
19. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE
-
20. 3D Texture Synthesis Using Graph Neural Cellular Automata
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, texture synthesis has been a heated topic in computer graphics, and the development of advanced algorithms for generating high-quality 3D textures is an area of active research. A recently proposed model, Neural Cellular Automata, can synthesize realistic 2D texture images or videos. READ MORE