Sökning: "metadata simulation"

Visar resultat 1 - 5 av 8 uppsatser innehållade orden metadata simulation.

  1. 1. An Empirical Survey of Bandits in an Industrial Recommender System Setting

    Master-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknik

    Författare :Tobias Schwarz; Johan Brandby; [2023-09-21]
    Nyckelord :computer science; industrial application; machine learning; reinforcement learning; multi-armed bandits; MAB; contextual multi-armed bandits; survey; batch learning;

    Sammanfattning : In this thesis, the effects of incorporating unstructured data—images in the wild—in contextual multi-armed bandits are investigated, when used within a recommender system setting, which focuses on picture-based content suggestion. The idea is to employ image features, extracted by a pre-trained convolutional neural network, and study the resulting bandit behaviors when including respective excluding this information in the typical context creation, which normally relies on structured data sources—such as metadata. LÄS MER

  2. 2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Ziyad Elbanna; [2023]
    Nyckelord :Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Sammanfattning : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. LÄS MER

  3. 3. Evaluation of a Proposed Traffic-Splitting Defence for Tor : Using Directional Time and Simulation Against TrafficSliver

    Master-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Författare :Jonathan Magnusson; [2021]
    Nyckelord :Tor; Website Fingerprinting; Deep Learning; Deep Fingerprinting; Traffic Splitting; TrafficSliver;

    Sammanfattning : Tor is a Privacy-Enhancing Technology based on onion routing which lets its users browse the web anonymously. Even though the traffic is encrypted in multiple layers, traffic analysis can still be used to gather information from meta-data such as time, size, and direction of the traffic. LÄS MER

  4. 4. Modeling Region Granularity of the D2M Memory SystemPin Tool driven test for the Split CacheHierarchy

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Johan Snider; [2018]
    Nyckelord :;

    Sammanfattning : Cache simulation is a potentially complex and time consuming task in the field of computer architecture. Often, only parts of a program are simulated due to practical time constraints. This thesis proposes a way to simulate entire benchmark programs using the Intel Pin platform (PIN) for research into the Directto-Master memory system (D2M). LÄS MER

  5. 5. Metadata filtering for secure and high performance user identification

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Niklas Jönsson; Marcus Rodan; [2018]
    Nyckelord :biometric identification; metadata filtering; metadata properties; metadata simulation; privacy protection; Technology and Engineering;

    Sammanfattning : The aim of this thesis is to investigate the possibility of enabling biometric identification given a large number of enrolled users. This area is relatively unexplored compared to biometric authentication where a fingerprint template is compared against just a few number of templates. LÄS MER