Searched for: contributor%3A%22Urbano%2C+Juli%C3%A1n+%28graduation+committee%29%22
(21 - 28 of 28)

Pages

document
Tatabitovska, Ana (author)
Front-running is the illegal practice of obtaining information unavailable to the general public with regards to upcoming transactions and performing actions based on this knowledge as to gain profit. This type of attack has been an issue since the introduction of the first stock market and it is not a surprise it has spread into blockchain...
bachelor thesis 2021
document
El Coudi El Amrani, Nafie (author)
Reentrancy attacks target smart contracts of Decentralized Finance systems that contain coding errors caused by developers. This type of attacks caused, in the past 5 years, the loss of over 400 million USD. Several countermeasures were developed that use patterns to detect reentrancy attacks on smart contracts before deployment on the Ethereum...
bachelor thesis 2021
document
Cirikka, Selim (author)
Protocols for Loanable Funds (PLFs) are lending protocols that exist in the decentralized finance (DeFi) ecosystem. They provide users the opportunity of lending and borrowing of cryptocurrencies. The economic model used to ensure liquidity in these protocols are variable parameters and incentives to reach an optimal equilibrium and...
bachelor thesis 2021
document
Vermeer, Jop (author)
Ambient occlusion is a popular rendering technique that creates a greater sense of depth and realism, by darkening places in the scene that are less exposed to ambient light (e.g., corners and creases). Ambient occlusion measures how geometrically occluded each point in the scene is and modulates the ambient light accordingly. In real-time...
master thesis 2020
document
van der Valk, Daan (author)
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on unintended leakage. Profiled attacks are the most powerful SCAs, as they assume the attacker has a perfect copy of the target device under his control. In recent years, machine learning (ML) and deep learning (DL) techniques have became popular as...
master thesis 2019
document
Chen, Joe (author)
For the real-world face recognition, factors such as occlusion and pose-variant (cross face) would affect the identification/verification performance. In addition, large number of classes also increase the complexity, which makes verification/identification even harder. In order to deal with these issues, how to extract discriminative embeddings...
master thesis 2019
document
Grashoff, Kilian (author)
Collaborative search, where the activities of multiple users are combined to satisfy their information need, is an effective tool to to handle complex search tasks. People search collaboratively in groups of varying sizes. Various collaborative search systems have been studied in previous work, but they only investigate a fixed group size....
master thesis 2019
document
Geneste, Ginger (author)
Modern Implantable Medical Devices (IMDs) are enabled to communicate with an external device trough wireless channels. The non-invasive method allow health-care practitioners to investigate the effectiveness of a treatment delivered by the IMD and tailor it specifically to the patients' needs. The wireless communication capability however, also...
master thesis 2017
Searched for: contributor%3A%22Urbano%2C+Juli%C3%A1n+%28graduation+committee%29%22
(21 - 28 of 28)

Pages