Avancerad sökning
Visar resultat 6 - 9 av 9 uppsatser som matchar ovanstående sökkriterier.
6. Sending Location-Based KeysUsing Visible Light Communication
Master-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : In this thesis we present a Security Application based on Visible Light Communication(VLC). As VLC continues to develop, the need to protect valuable informationtransmitted using this type of communication is also growing. LÄS MER
7. Mellan dig och mig
Master-uppsats, Göteborgs universitet/Högskolan för scen och musikSammanfattning : How can I make art that face people in their everyday lives, which is integrated into their lives, becoming a part of the discussions both in the mundane and in the room of society? Can I do this by working with performative interpretations that are participatory driven? I have explored how artists and participants can create spaces that are both open and confiden- ce-building, and how they at the same time enable us to question established norms. How to engage in dialogues concerning social, political and existential issues like; What is freedom for me - What is freedom to you? What is it that is important? Which topics are never upraised for discussion? The project is about putting thoughts, experiences and bodies (my own, the participants and the viewer’s) in relation to each other and to the location and context they are in. LÄS MER
8. Structured spend analysis
M1-uppsats, Lunds universitet/ProduktionsekonomiSammanfattning : In the ongoing joint venture between Ericsson and ST Microelectronics, EMP spend data needed to be extracted, consolidated and analyzed to support the ongoing joint venture. Provide an understanding what spend analysis is and how it can support the business and operations in the company. LÄS MER
9. Säkerhetsutvärdering certifikatserver i stället för aktiva kort
Uppsats för yrkesexamina på grundnivå, Institutionen för systemteknikSammanfattning : Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. LÄS MER