Essays about: "running-in"

Showing result 1 - 5 of 124 essays containing the word running-in.

  1. 1. Towards Performance Evaluation and Future Applications of eBPF

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Manideep Gunturu; Rohan Aluguri; [2024]
    Keywords : eBPF; XDP; Iptables; Filtering; Performance evaluation;

    Abstract : Extended Berkeley Packet Filter (eBPF) is an instruction set and an execution environment inside the Linux kernel. eBPF improves flexibility for data processing and is realized via a virtual machine featuring both a Just-In-Time (JIT) compiler and an interpreter running in the kernel. READ MORE

  2. 2. Performance evaluation of VPN solutions in multi-region kubernetes cluster

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Bharani Kumar Yedla; [2023]
    Keywords : Kubernetes; Docker; Virtual Private Network; Wireguard; OpenVPN; SoftEther; Tinc; ZeroTier; Performance evaluations;

    Abstract : Containerization is widely recognized as a form of lightweight virtualization in the cloud. Due to its reliability, maturity, and rich capabilities, kubernetes has established itself as the de-facto standard for deployments and maintenance of containers. READ MORE

  3. 3. Parallelization of boolean operations for CAD Software using WebGPU

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Max Helmrich; Linus Käll; [2023]
    Keywords : Parallelization; Web; Boolean Operations; WebGPU; CAD; GPU Acceleration;

    Abstract : This project is about finding ways to improve performance of a Computer-Aided-Design (CAD) application running in the web browser. With the new Web API WebGPU, it is now possible to use the GPU to accelerate calculations for CAD applications in the web. READ MORE

  4. 4. Automated Application Security Testing in Two Pharmacovigilance Systems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Daniel Fehrm; [2023]
    Keywords : ;

    Abstract : To improve the security of IT systems, companies can use automated security testing. In this thesis, three methods for automated security testingare evaluated and compared against each other. READ MORE

  5. 5. An evaluation of tools for verifying non-functional requirements for cloud deployed applications.

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Jonas Ernerstedt; [2023]
    Keywords : ;

    Abstract : Evaluating non-functional requirements is a crucial part of distributed systems. As cloud deployed systems are continuously developed, the quality of the system must be verified for every iteration. READ MORE