Essays about: "privacy architecture"

Showing result 1 - 5 of 79 essays containing the words privacy architecture.

  1. 1. Architecture and CognitionArchitectural settings’ influence on cognitive performance in an isolated and confined environment, over time.

    University essay from KTH/Ergonomi

    Author : Michail Magkos; [2024]
    Keywords : Cognitive; Ergonomics; Architecture; Working Memory; Space; Isolation;

    Abstract : his thesis examines the relationship between architectural design in a space analog environment and cognitive performance. This is done through longitudinal, repeated measures, quantitative study which was conducted during a Mars analog mission, with cognitive assessments administered under different environmental conditions within the mission habitat. READ MORE

  2. 2. Mind The Gap Between Your Intelligence And Choice Architecture

    University essay from Göteborgs universitet/Graduate School

    Author : Amanda Liljevall; Emelie Lillskog; [2023-07-03]
    Keywords : Cookie consent notices; cookie banner; choice architecture; consumer choice behaviour; general data protection regulation; GDPR; online privacy; web content analysis;

    Abstract : Digital footprints of online behaviour are now possible to gather through the use of cookies. As a result, consumer activities once considered private are now monitored and used by online businesses and marketers, providing them with information about who we are, what we think, and what we like. READ MORE

  3. 3. Tenant Separation on a multi-tenant microservice platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Axel Sandqvist; [2023]
    Keywords : multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Abstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE

  4. 4. Towards Building Privacy-Preserving Language Models: Challenges and Insights in Adapting PrivGAN for Generation of Synthetic Clinical Text

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Atena Nazem; [2023]
    Keywords : Generative Adversarial Networks; privacy-preserving language models; clinical text data; reinforcement learning; synthetic data;

    Abstract : The growing development of artificial intelligence (AI), particularly neural networks, is transforming applications of AI in healthcare, yet it raises significant privacy concerns due to potential data leakage. As neural networks memorise training data, they may inadvertently expose sensitive clinical data to privacy breaches, which can engender serious repercussions like identity theft, fraud, and harmful medical errors. READ MORE

  5. 5. Low-power Implementation of Neural Network Extension for RISC-V CPU

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dario Lo Presti Costantino; [2023]
    Keywords : Artificial intelligence; Deep learning; Neural networks; Edge computing; Convolutional neural networks; Low-power electronics; RISC-V; AI accelerators; Parallel processing; Artificiell intelligens; Deep learning; Neurala nätverk; Edge computing; konvolutionella neurala nätverk; Lågeffektelektronik; RISC-V; AI-acceleratorer; Parallell bearbetning;

    Abstract : Deep Learning and Neural Networks have been studied and developed for many years as of today, but there is still a great need of research on this field, because the industry needs are rapidly changing. The new challenge in this field is called edge inference and it is the deployment of Deep Learning on small, simple and cheap devices, such as low-power microcontrollers. READ MORE