Essays about: "System Dependence Graph"

Found 4 essays containing the words System Dependence Graph.

  1. 1. Setup Implementation for a Direct Measurement Technique of the Magnetocaloric Effect

    University essay from KTH/Materialvetenskap

    Author : Ferdinand Posva; [2020]
    Keywords : Magnetocaloric effect; Direct method; Gadolinium; High entropy alloys;

    Abstract : This project presents an attempt to construct a setup and implement a reliable technique for measuring the magnetocaloric effect (MCE) on various materials via a direct method for the acquisition of the data. The main objective of the latter is to produce a ∆Tadiabatic vs T graph over a reasonable temperature span (-100◦C up to 220◦C) by thermal monitoring of a magnetic material exposed to an oscillating magnetic field with a maximum strength of 1. READ MORE

  2. 2. Program Dependence Graph Generation and Analysis for Source Code Plagiarism Detection

    University essay from Institutionen för datavetenskap; Tekniska högskolan

    Author : Niklas Holma; [2012]
    Keywords : plagiarism; program dependence graph;

    Abstract : Systems and tools that finds similarities among essays and reports are widely used by todays universities and schools to detect plagiarism. Such tools are however insufficient when used for source code comparisons since they are fragile to the most simplest forms of diguises. READ MORE

  3. 3. Automatic Generation of Simulation Models from Designs

    University essay from Institutionen för datavetenskap

    Author : Erik Axling; [2007]
    Keywords : TXL; VirtualTime; OSE; Backward Slicing; System Dependence Graph;

    Abstract : When working with embedded systems, secure and fast applications are desired. To achieve this the applications needs to be analyzed and optimized so that they will not be deadlocked or communicate inefficiently. For this purpose an analysis program that can track communications, deadlocks and response times is needed. READ MORE

  4. 4. Modeling and Pattern Matching Security Properties with Dependence Graphs

    University essay from Institutionen för datavetenskap

    Author : Pia Fåk; [2005]
    Keywords : information security; static analysis; dependence graphs; pattern matching;

    Abstract : With an increasing number of computers connected to the Internet, the number of malicious attacks on computer systems also raises. The key to all successful attacks on information systems is finding a weak spot in the victim system. Some types of bugs in software can constitute such weak spots. READ MORE