Essays about: "System logic evaluation"
Showing result 1 - 5 of 48 essays containing the words System logic evaluation.
-
1. Dynamic container orchestration for a device-cloud continuum
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Edge computing has emerged as a paradigm to support the growing demand for real-time processing of data generated at the edge of the network. As the devices at the edge are constrained, one of the challenges in the area is how to schedule workloads. READ MORE
-
2. CLIENT-SIDE CACHING: REDUCING SERVER LOAD AND LATENCY IN A NETWORK TRAFFIC ANALYSIS TOOL
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Caching is a fundamental technique widely used in the field of computing to reduce network traffic, server load, and latency. Storing frequently accessed data in a high-speed cache layer can make future requests process faster by involving fewer system components when generating and serving the response. READ MORE
-
3. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE
-
4. Escape the Decision Arena : Designing and evaluating an immersive collaborative gaming experience in a cylindrical environment
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : The Decision Arena in Linköping University contains a 360° cylindrical display with a complementary 360° sound system consisting of eight evenly spaced speakers along the bottom edge of the screen. This paper explores if an immersive game can be developed for such a non-typical gaming environment. READ MORE
-
5. Evaluation of security threats in microservice architectures
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The microservice architecture is a popular architectural pattern in the industry to implement large systems as they can reduce the code bases of each service and increase the maintainability for each of the individual services by dividing the application into smaller components based on business logic. The services can be implemented in different programming languages and communicates over a network. READ MORE