Sökning: "hash code"

Visar resultat 1 - 5 av 7 uppsatser innehållade orden hash code.

  1. 1. Subtree Hashing of Tests in Build Systems : Rust Tricorder

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Calin Capitanu; [2023]
    Nyckelord :Build systems; tests execution; caching; Abstract Syntax Tree parsing; Sisteme de construire; Teste; Memorare in cache; Arbore sintactic abstract; Bygg system; tester; cachelagring; analys av abstrakt syntaxträd;

    Sammanfattning : Software applications are built by teams of developers that constantly iterate over the codebase. Software projects rely on a build system, which handles the management of dependencies, compilation, testing, and deployment of the software. LÄS MER

  2. 2. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Martin Lang; [2019]
    Nyckelord :Automotive Ethernet; Information Security; Integrity; Time Sensitive Systems; Automotive Ethernet; Informationssäkerhet; Integritet; tidskänsliga system;

    Sammanfattning : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. LÄS MER

  3. 3. Java GPU vs CPU Hashing Performance

    Kandidat-uppsats, Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Författare :Zhuowen Fang; [2018]
    Nyckelord :Blockchain; SHA-256; CPU; GPU; Java; JOCL; PoW;

    Sammanfattning : In the latest years, the public’s interest in blockchain technology has been growing since it was brought up in 2008, primarily because of its ability to create an immutable ledger, for storing information that never will or can be changed. As an expanding chain structure, the act of nodes adding blocks to the chain is called mining which is regulated by consensus mechanism. LÄS MER

  4. 4. Preventing SQL Injections by Hashing the Query Parameter Data

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Författare :Patrik Lokby; Manfred Jönsson; [2017]
    Nyckelord :SQL injection; Proxy; MD5 hash; Regex.;

    Sammanfattning : Context. Many applications today use databases to store user informationor other data for their applications. This information can beaccessed through various different languages depending on what typeof database it is. Databases that use SQL can maliciously be exploitedwith SQL injection attacks. LÄS MER

  5. 5. Improvement for LDPC Coded OFDM Communication System over Power Line

    Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Wu Dan; [2013]
    Nyckelord :low‐voltage power line communication LV‐PLC ; LDPC; OFDM; impulse noise suppression; Class‐A noise;

    Sammanfattning : Power line communication has been around in past decades and gained renewed attention thanks to the demand of high-speed Internet access. With the significant advantages of existing infrastructure and accessibility to even remote areas, power grid has become one of the promising competitors for multi-media transmission in household. LÄS MER