Sökresultat

Filtyp

527925 sökträffar

Findability through Traceability - A Realistic Application of Candidate Trace Links?

Since software development is of a dynamic nature, the impact analysis is an inevitable work task. Traceability is known as one factor that supports this task, and several researchers have proposed traceability recovery tools to propose trace links in an existing system. However, these semi-automatic tools have not yet proven useful in industrial applications. Based on an established automation mo

Aspects on the Regio and Stereo Selectivity in the Hydrolsilylation of 1,3-Dienes

Popular Abstract in Swedish Hydrosilyleringsreaktionen är formellt en addition av en hydrosilan till ett omättat system. Reaktionen är oftast katalyserad av en övergångsmetall, och i denna process är det möjligt att påverka på vilket sätt additionen sker. Denna avhandling är en sammanfattning av fyra artiklar som behandlar regio-, stereo- och kemoselektivitet vid addition av hydrosilaner till konjThis thesis is a summary of four papers concerning various aspects on the transition metal catalysed hydrosilylation of 1,3-dienes. The hydrosilylation reaction is formally an addition of a hydrosilane to an unsaturated system and depending on the reaction conditions, control of stereo-, regio-, and chemo-selectivity can be achieved. Optically active heterobidentate P,N ligands were synthesised f

The Effect of Visual Gender on Abuse in Conversation with ECAs

Previous studies have shown that female ECAs are more likely to be abused than male agents, which may cement gender stereotypes. In the study reported in this paper a visually androgynous ECA in the form of a teachable agent in an educational math game was compared with a female and male agent. The re-sults confirm that female agents are more prone to be verbally abused than male agents, but also

Process based Modelling of Chemical and Physical Aerosol Properties Relevant for Climate and Health

Atmospheric aerosol particles have substantial influence on climate and air quality. However, the anthropogenic influence on the atmospheric aerosol is still poorly known. This limits the understanding of past and future climate changes. Additionally, both epidemiological and toxicological studies indicate adverse health effects of inhaled aerosol particles. In order to study the effect of atmosph

The Phonology of Mongolian

This book provides (a) the first comprehensive description of the phonology and phonetics of Standard Mongolian, known as the Halh (Khalkha) dialect and spoken in Ulaanbaatar, the capital of the Republic of Mongolia; and (b) the first account in any language of the historical phonology of the Mongolian group of languages. The synchronic phonology is based on data collected by the authors and on th

YouTube Traffic Content Analysis in the Perspective of Clip Category and Duration

In this work, we study YouTube traffic characteristics in a medium-sized Swedish residential municipal network that has 2600 mainly FTTH broadband-connected households. YouTube traffic analyses were carried out in the perspective of video clip category and duration, in order to understand their impact on the potential local network caching gains. To the best of our knowledge, this is the first tim

Some instant- and practical-time related-key attacks on KTANTAN32/48/64

The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revisit their result before investigating how to exploit the weakest key bits. We then develop several related-key attacks, e.g., one on KTANTAN32 which finds 28 key bits in time equivalent to $2^{3.0}$ calls to the full KTANTA

A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries

The problem of correctly recovering assembly instructions from a binary has received much attention and both malware and license validation code often relies on various anti-disassembly techniques in order to complicate analysis. One well-known anti-disassembly technique is to use overlapping code such that the disassembler starts decoding from an incorrect byte, but still recovers valid code. The