Search
Now showing items 1-10 of 12
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
Spoofing and anti-spoofing techniques for text-independent speaker verification systems
(2015-10)
There has been substantial progress in the speaker verification field in recent years. I-vector based approach in particular received significant attention due to its high performance. Improvements in the verification ...
Extending static analysis with application-specific rules by analyzing runtime execution traces
(2016-07)
Static code analysis tools can generate alerts regarding only generic issues such as uninitialized variables. They cannot detect violations of application-speci c rules. Tools can be extended with specialized checkers that ...
A gamified lesson preparation system
(2017-01)
Good games are embedded with many elements that make them attractive to play. If lessons could also be gamified, they would cease to be boring and become attractive as well. This could result in students spending more time ...
Risk-driven model-based testing
(2018-05)
Software is becoming larger and more complex in consumer electronics products. As a result, testing these products for reliability is becoming a major challenge. Traditional and manual testing activities are not effective ...
High level synthesis for rapid design of video processing pipes
(2017-01)
Pipelining concept is a fundamental technique in digital hardware design, which maximizes the clock frequency or minimizes the resources. Designing a pipelined Field Programmable Gate Array (FPGA) module using pipelined ...
HTTP adaptive streaming with advanced transport
(2018-09)
QUIC (Quick UDP Internet Connections) is an experimental and low-latency transport network protocol proposed by Google, which is still being improved and specified in the IETF. The viewer's quality of experience (QoE) in ...
Zeroability patterns of monomials in the sign-representation of boolean functions
(2017-06)
Boolean functions (BF) are one of the fundamental concepts in discrete mathematics. It is possible to represent any BF by a unique polynomial when one takes -1 as True and 1 as False. Coefficients of the polynomial ...
Tool support for model based software product line testing
(2018-01)
We introduce a tool for automated adaptation of test models to be reused for a prod uct family. Test models are specified in the form of hierarchical Markov chains. They represent possible usage behavior regarding the ...
The costs and benefits of turning data into information using big data systems
(2014-08)
This thesis explains problems of and solutions for storing and processing big volumes and streaming types of data in a cost-e ective way for enterprise companies. There are several problems like operational, infrastructural ...
Share this page