Essays about: "remote computing"
Showing result 6 - 10 of 48 essays containing the words remote computing.
-
6. Exploring Selective coherence as a Solution to Self-invalidation in ArgoDSM
University essay from Uppsala universitet/DatorteknikAbstract : Maintaining coherency in a distributed system can prove challenging, this is especially true for distributed shared memory systems. The problem with remote synchronization in the distributed shared memory software ArgoDSM occurs when a lock operation has to cross the boundaries of a node, this causes a large number of self-invalidations (SI) or self-downgrades (SD) which is costly. READ MORE
-
7. Procedurally Generated Eye Features for Real-time Applications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. As computing power has increased over the years, larger parts of the digital graphics industries are moving towards using real-time rendering for their solutions. The fast iteration and visual response help make the creative processes and communication more accessible in both the desktop and smartphone markets. READ MORE
-
8. Distributed Intelligence for Multi-Robot Environment : Model Compression for Mobile Devices with Constrained Computing Resources
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Human-Robot Collaboration (HRC), where both humans and robots work in the same environment simultaneously, is an emerging field and has increased massively during the past decade. For this collaboration to be feasible and safe, robots need to perform a proper safety analysis to avoid hazardous situations. READ MORE
-
9. Analysing usability testing solutions for teacher-student interfaces
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : In today’s connected world, there exists a large amount of tools that did not exist during the inception of computing and user interfaces. Many of these have seen their natural advent due to the Internet’s global accessibility. READ MORE
-
10. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE