• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 21
  • 8
  • 2
  • 2
  • 1
  • Tagged with
  • 37
  • 10
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Automatic code generation and optimization of multi-dimensional stencil computations on distributed-memory architectures / Génération automatique de code et optimisation de calculs stencils sur des architectures à mémoire distribuée

Saied, Mariem 25 September 2018 (has links)
Nous proposons Dido, un langage dédié (DSL) implicitement parallèle qui capture les spécifications de haut niveau des stencils et génère automatiquement du code parallèle de haute performance pour les architectures à mémoire distribuée. Le code généré utilise ORWL en tant que interface de communication et runtime. Nous montrons que Dido réalise un grand progrès en termes de productivité sans sacrifier les performances. Dido prend en charge une large gamme de calculs stencils ainsi que des applications réelles à base de stencils. Nous montrons que le code généré par Dido est bien structuré et se prête à de différentes optimisations possibles. Nous combinons également la technique de génération de code de Dido avec Pluto l'optimiseur polyédrique de boucles pour améliorer la localité des données. Nous présentons des expériences qui prouvent l'efficacité et la scalabilité du code généré qui atteint de meilleures performances que les implémentations ORWL et MPI écrites à la main. / In this work, we present Dido, an implicitly parallel domain-specific language (DSL) that captures high-level stencil abstractions and automatically generates high-performance parallel stencil code for distributed-memory architectures. The generated code uses ORWL as a communication and synchronization backend. We show that Dido achieves a huge progress in terms of programmer productivity without sacrificing the performance. Dido supports a wide range of stencil computations and real-world stencil-based applications. We show that the well-structured code generated by Dido lends itself to different possible optimizations and study the performance of two of them. We also combine Dido's code generation technique with the polyhedral loop optimizer Pluto to increase data locality and improve intra-node data reuse. We present experiments that prove the efficiency and scalability of the generated code that outperforms both ORWL and MPI hand-crafted implementations.
32

Development of a reliable and time-efficient digital production process of encrypted intelligent keys : Embedded systems and software development

Almario Strömblad, Fredrik, Svensson, Primus January 2022 (has links)
Smart keys are increasing in popularity due to the many benefits they bring. Access control and overview have never been more efficient than it is today. This thesis project automates the digital production of a new line of keys. Automating this production process improves the production in scalability, reliability, and efficiency. This report includes background research on critical components, methodologies to solve presented subproblems, the results of this project, and a discussion providing insight into the possible benefits of using an automated development line. This automation’s core elements are an integrated circuit holding a microcontroller, hardware components, and a graphical user interface. This project results in an automated production process capable of producing smart keys more efficiently than today. A report containing the most common errors using this production process and suggestions to improve scalability, reliability, and efficiency further. / De många fördelar smarta nycklar bidrar med gör att de snabbt ökar i popularitet. Åtkomst och översikt över tillgång har aldrig varit så effektivt som det är idag. Detta examensarbete automatiserar den digitala produktionen av en ny serie elektroniska nycklar. Genom att automatisera den här processen kommer produktionens skalbarhet, pålitlighet och effektivitet att öka. Den här rapporten innehåller bakgrundsundersökningar gällande kritiska områden för utvecklingen, metoder för att lösa problemställningar, projektets resultat samt en diskussion gällande möjliga fördelar av produktionsautomatisering. Grundelementen i den här automatiseringen är ett kretskort med en mikrokontroller, hårdvarukomponenter samt ett grafiskt användargränssnitt. Projektet resulterar i en produktionsprocess kapabel att producera elektroniska nycklar effektivare än tidigare möjligt samt en rapport innehållande de mest förekommande produktionsfelen relaterade till den automatiserade processen. Rapporten innehåller även förslag på förbättringar för att ytterligare öka skalbarhet, pålitlighet och effektivitet.
33

Security evaluation of a smart lock system / Säkerhetsutvärdering av ett smart låssystem

Hassani, Raihana January 2020 (has links)
Cyber attacks are an increasing problem in the society today. They increase dramatically, especially on IoT products, such as smart locks. This project aims to evaluate the security of the Verisure smartlock system in hopes of contributing to a safer development of IoT products and highlighting theexisting flaws of today’s society. This is achieved by identifying and attempting to exploit potential vulnerabilities with threat modeling and penetration testing. The results showed that the system is relatively secure. No major vulnerabilities were found, only a few weaknesses, including the possibility of a successful DoS attack, inconsistent password policy, the possibility of gaining sensitive information of a user and cloning the key tag used for locking/unlocking the smart lock. / Cyberattacker är ett ökande problem i samhället idag. De ökar markant, särskilt mot IoT-produkter, såsom smarta lås. Detta projekt syftar till att utvärdera säkerheten i Verisures smarta låssystem i hopp om att bidra till en säkrare utveckling av IoT-produkter och belysa de befintliga bristerna i dagens samhälle. Detta uppnås genom att identifiera och försöka utnyttja potentiella sårbarheter med hotmodellering och penetrationstestning. Resultaten visade att systemet är relativt säkert. Inga större sårbarheter hittades, bara några svagheter, inklusive möjligheten till en lyckad DoS-attack, inkonsekvent lösenordspolicy, möjligheten att få känslig information från en användare och kloning av nyckelbrickan som används för att låsa/låsa upp smarta låset.
34

Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks

Robberts, Christopher, Toft, Joachim January 2019 (has links)
Internet of Things (IoT) devices are becoming more ubiquitous than ever before, and while security is not that important for every type of device, it is crucial for some. In this thesis, a widely available Bluetooth smart lock is examined through the lens of security. By using well-known attack methods, an attempt is made to exploit potential vulnerabilities in the system.The researched lock was found to have design flaws that could be considered low-impact vulnerabilities, but using the system without these flaws in mind could lead to harmful outcomes for the lock owner.Except for the design flaws, no real security problems were discovered, but the methods used in this thesis should be applicable for further IoT security research. / IoT-apparater blir allt mer vanliga i samhället. Det är inte ett krav för alla typer av apparater att ha stark säkerhet, men för vissa är det helt avgörande. I denna avhandling undersöks ett allmänt tillgängligt Bluetooth-smartlås utifrån ett säkerhetsperspektiv. Genom att använda välkända angreppsmetoder görs det ett försök att utnyttja potentiella sårbarheter i systemet.Låset visade sig ha designfel som skulle kunna betraktas som sårbarheter med låg hotnivå, men att använda systemet utan dessa designfel i åtanke skulle kunna leda till farliga påföljder för låsägaren.Förutom designfelen upptäcktes inga riktiga säkerhetsproblem, men metoderna som används i denna avhandling bör vara tillämpliga för ytterligare säkerhetsforskning inom IoT.
35

Komise pro kanalisování řek Vltavy a Labe v Čechách 1896 -1931 / The Commission for making the river Vltava and the river Labe in Bohemia navigable 1986 - 1931

Černá, Marcela January 2014 (has links)
The Commission for making the river Vltava and the river Labe in Bohemia navigable was founded in 1896 on the basis of a decree of the ministry of interior as the first water management office to be systematically engaged in making Czech rivers navigable by the canalization method. The Commission was headed by the vice-regent of the Kingdom of Bohemia to whom the members of state's and country's curia were subordinate. The executive section was represented by the central office, composed of the technical and administrative departments. Its activities were financed by two thirds by the Austrian state, one third was paid from the Czech country's treasury. After the establishment of the independent Czechoslovak republic, both curias were dissolved and the Commission was put under the control of the ministry of public works. The president of the country's political administration was appointed as the head of the Commission. The competence of the Commission was step by step extended from the initially entrusted task of making the river Vltava and the river Labe in the division Prague - Ústí nad Labem navigable also to making the river Vltava in Prague navigable as well as to the adaptation of the Holešovice port in Prague to a modern trade port and to drawing up studies on the utilization of water...
36

Waiting for Locks: How Long Does It Usually Take?

Baier, Christel, Daum, Marcus, Engel, Benjamin, Härtig, Hermann, Klein, Joachim, Klüppelholz, Sascha, Märcker, Steffen, Tews, Hendrik, Völp, Marcus 10 September 2013 (has links) (PDF)
Reliability of low-level operating-system (OS) code is an indispensable requirement. This includes functional properties from the safety-liveness spectrum, but also quantitative properties stating, e.g., that the average waiting time on locks is sufficiently small or that the energy requirement of a certain system call is below a given threshold with a high probability. This paper reports on our experiences made in a running project where the goal is to apply probabilistic model checking techniques and to align the results of the model checker with measurements to predict quantitative properties of low-level OS code.
37

Waiting for Locks: How Long Does It Usually Take?

Baier, Christel, Daum, Marcus, Engel, Benjamin, Härtig, Hermann, Klein, Joachim, Klüppelholz, Sascha, Märcker, Steffen, Tews, Hendrik, Völp, Marcus January 2012 (has links)
Reliability of low-level operating-system (OS) code is an indispensable requirement. This includes functional properties from the safety-liveness spectrum, but also quantitative properties stating, e.g., that the average waiting time on locks is sufficiently small or that the energy requirement of a certain system call is below a given threshold with a high probability. This paper reports on our experiences made in a running project where the goal is to apply probabilistic model checking techniques and to align the results of the model checker with measurements to predict quantitative properties of low-level OS code.

Page generated in 0.0307 seconds