Searched for: contributor%3A%22Urbano%2C+Juli%C3%A1n+%28graduation+committee%29%22
(21 - 28 of 28)
Pages
- 1
- 2
- document
-
Tatabitovska, Ana (author)Front-running is the illegal practice of obtaining information unavailable to the general public with regards to upcoming transactions and performing actions based on this knowledge as to gain profit. This type of attack has been an issue since the introduction of the first stock market and it is not a surprise it has spread into blockchain...bachelor thesis 2021
- document
-
El Coudi El Amrani, Nafie (author)Reentrancy attacks target smart contracts of Decentralized Finance systems that contain coding errors caused by developers. This type of attacks caused, in the past 5 years, the loss of over 400 million USD. Several countermeasures were developed that use patterns to detect reentrancy attacks on smart contracts before deployment on the Ethereum...bachelor thesis 2021
- document
-
Cirikka, Selim (author)Protocols for Loanable Funds (PLFs) are lending protocols that exist in the decentralized finance (DeFi) ecosystem. They provide users the opportunity of lending and borrowing of cryptocurrencies. The economic model used to ensure liquidity in these protocols are variable parameters and incentives to reach an optimal equilibrium and...bachelor thesis 2021
- document
-
Vermeer, Jop (author)Ambient occlusion is a popular rendering technique that creates a greater sense of depth and realism, by darkening places in the scene that are less exposed to ambient light (e.g., corners and creases). Ambient occlusion measures how geometrically occluded each point in the scene is and modulates the ambient light accordingly. In real-time...master thesis 2020
- document
-
van der Valk, Daan (author)Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on unintended leakage. Profiled attacks are the most powerful SCAs, as they assume the attacker has a perfect copy of the target device under his control. In recent years, machine learning (ML) and deep learning (DL) techniques have became popular as...master thesis 2019
- document
-
Chen, Joe (author)For the real-world face recognition, factors such as occlusion and pose-variant (cross face) would affect the identification/verification performance. In addition, large number of classes also increase the complexity, which makes verification/identification even harder. In order to deal with these issues, how to extract discriminative embeddings...master thesis 2019
- document
-
Grashoff, Kilian (author)Collaborative search, where the activities of multiple users are combined to satisfy their information need, is an effective tool to to handle complex search tasks. People search collaboratively in groups of varying sizes. Various collaborative search systems have been studied in previous work, but they only investigate a fixed group size....master thesis 2019
- document
-
Geneste, Ginger (author)Modern Implantable Medical Devices (IMDs) are enabled to communicate with an external device trough wireless channels. The non-invasive method allow health-care practitioners to investigate the effectiveness of a treatment delivered by the IMD and tailor it specifically to the patients' needs. The wireless communication capability however, also...master thesis 2017
Searched for: contributor%3A%22Urbano%2C+Juli%C3%A1n+%28graduation+committee%29%22
(21 - 28 of 28)
Pages
- 1
- 2