Essays about: "overhead analysis"
Showing result 6 - 10 of 127 essays containing the words overhead analysis.
-
6. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
7. Assessment of Shoulder Biomechanics during Pull-up Techniques
University essay from KTH/Medicinteknik och hälsosystemAbstract : CrossFit® has gained popularity as a functional training method that caters to individuals with varying levels of fitness, including those with little to no athletic background. Regardless, shoulders represent the highest injury rate in this sport, most frequently associated with pull-up variations. READ MORE
-
8. Counterfeit product grouping - a cluster ensemble approach
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : he need for the development and use of efficient and reliable Anticounterfeit techniques in the manufacturing industry and online trading has recently increased tremendously. Flooding counterfeit products in the international market have several adverse social and economic impacts globally. READ MORE
-
9. Performance Analysis of a Godot Game-Agnostic Streaming Tool
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Streaming games is traditionally done with video and audio both for watching on websites like Twitch and YouTube or playing via cloud gaming services. Streaming with video and audio requires good internet speeds to be of satisfactory quality therefore compression algorithms are used. READ MORE
-
10. The Effect Background Traffic in VPNs has on Website Fingerprinting
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE