Cerca
Items 11-20 di 44
Requirements engineering for complex systems
(2017-07-26)
Requirements Engineering (RE) is a part of Software Engineering and, in
general, of System Engineering. RE aims to help in building software which
satis es the user needs, eliciting, documenting, validating and maintaining ...
Random telegraph signal in CMOS single photon avalanche diodes
(2019-05-21)
This dissertation is focused on single photon devices that have triggered a real revolution in the world of imaging, the Single Photon Avalanche Diodes (SPADs). These devices acquired immediately a great interest in the ...
Anomalies in cyber security: detection, prevention and simulation approaches
(2018-07-03)
With themassive adoption of the Internet both our private andworking life has drastically
changed. The Internet has introduced new ways to communicate and complete
every day tasks. Organisations of any kind have taken ...
Integration of nanophotonic devices on silicon
(2019-06-20)
The purpose of this thesis research project has been the integration of photonic
nanostructures on silicon substrate.
In particular, three different devices have been developed, whose application
fields fall within the ...
Global Optimization, Ordinary Differential Equations and Infinity Computing
(2018-06-08)
La tesi consiste in 4 capitoli. I primi due capitoli riguardano l’ottimizzazione globale utilizzando il framework dei computer tradizionali, mentre gli altri due capitoli riguardano l’utilizzo della nuova tipologia dei ...
<<A>> Defect-Centric analysis of the channel hot carrier degradation
(2016-02-02)
Durante l'ultimo decennio, il channel hot carrier (CHC) e
stato considerato uno dei pi u importanti meccanismi di degrado
della moderna tecnologia CMOS. La degradazione CHC si veri-
ca quando un voltaggio superiore a ...
User behavioral problems in complex social networks
(2019-06-20)
Over the past two decades, we witnessed the advent and the rapid growth of
numerous social networking platforms. Their pervasive diffusion dramatically
changed the way we communicate and socialize with each other. They ...
Hardening the security of modern operating systems against side-channel and rowhammer attacks
(2019-06-20)
Advancements in exploitation techniques call for the need of advanced defenses. Modern
operating systems have to face new sophisticate attacks that do not rely on any programming
mistake, rather they exploit leaking ...