Essays about: "Tradeoff"

Showing result 11 - 15 of 145 essays containing the word Tradeoff.

  1. 11. Extremal Mechanisms for Pointwise Maximal Leakage

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Leonhard Grosse; [2023]
    Keywords : Privacy; mechanism design; information leakage; convex optimization; information-theoretic utility; Integritet; Mekanismdesign; informationsläckage; konvex optimering; informationsteoretisk användbarhet.;

    Abstract : In order to implement privacy preservation for individuals, systems need to utilize privacy mechanisms that privatize sensitive data by randomization. The goal of privacy mechanism design is to find optimal tradeoffs between maximizing the utility of the privatized data while providing a strict sense of privacy defined by a chosen privacy measure. READ MORE

  2. 12. An Arrow Metalanguage for Partially Invertible Computation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anders Ågren Thuné; [2023]
    Keywords : Reversible computation; Domain-specific languages; Arrows; Partial invertibility; Reversibel beräkning; Domänspecifika språk; Arrows; Partiell inverterbarhet;

    Abstract : Programming languages traditionally describe computations going one way: a program might compute a hash value from a string, or an encrypted message from a plaintext. However, sometimes it is also of interest to go the other way around: for encryption, we not only want to encrypt messages but also to decrypt them, and to be sure that the decryption correctly reproduces the original message. READ MORE

  3. 13. Image encoding evaluation in remote desktop systems : A framework for measuring the encoding performance inTigerVNC

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Adam Halim; [2023]
    Keywords : VNC; TigerVNC; RFB; Remote desktop; Image encoding; Compression; X; X11; Performance evaluation;

    Abstract : Remote desktop solutions have widespread adoption across the world, allowing people to connect to a computer remotely from anywhere in the world. One widely used solution is TigerVNC which uses the RFB protocol for communication between a client and server. READ MORE

  4. 14. Compact Ku-band Microwave Filters Realised using Suspended Integrated Stripline Technology

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Henrik Åkerberg; [2023]
    Keywords : Suspended Substrate Stripline; Microwave filter; Low Profile; Quasi-Planar; Bandpass Filter; Hängande-Substrat-Stripline; Mikrovågsfilter; Låg profil; Kvasi-planar; Bandpassfilter;

    Abstract : As the fifth generation of telecommunications is deployed, and the number of devices transmitting in the microwave bands grows, effective filtering technologies are becoming ever more important. When a filter is designed, some performance trade-offs have to be made, and one of them is the trade-off between filter size and electrical performance. READ MORE

  5. 15. A Game-theoretical Framework for Byzantine-Robust Federated Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Wanyun Xie; [2022]
    Keywords : Game theory; distributed robust learning; training-time attacks; exploration-exploitation tradeoff; Spelteori; distribuerad robust inlärning; attacker på träningstiden; kompromiss mellan utforskning och exploatering;

    Abstract : The distributed nature of Federated Learning (FL) creates security-related vulnerabilities including training-time attacks. Recently, it has been shown that well-known Byzantine-resilient aggregation schemes are indeed vulnerable to an informed adversary who has access to the aggregation scheme and updates sent by clients. READ MORE