Trepo - Selaus tiedekunnan mukaan (- 2018)
Viitteet 1-20 / 916
-
0-1 lait äärellisissä malleissa
(2012)
Pro gradu -tutkielmaÄärellisten mallien teoria on tietotekniikan kehityksen tarpeiden seurauksena kasvanut matemaattisen logiikan osa-alue. Teorian ensimmäisiä tuloksia oli Trakhtenbrotin tulos vuodelta 1950, jonka mukaan validius äärellisissä ... -
A case study of the robustness and the usability of CAPTCHA
(2016)
Pro gradu -tutkielmaThe websites and network application experienced explosive growth in the past two decades. As the evolution of smartphones and mobile communication network have evolved, smart phone s user experience has been improved to ... -
A case study: Analysing current state of documentation and its effects
(2014)
Pro gradu -tutkielmaThis thesis introduces a qualitative research made in order to answer questions What is the state of documentation and what are its effect in the case study organisation. The case study organisation is an international ICT ... -
A collaborative filtering based persona identification in requirements elicitation
(2016)
Pro gradu -tutkielmaPersona is a fictional character that archetypically represents a user group. Persona identification is an important step in requirements elicitation. A review of related literature has shown that the persona is identified ... -
A complete guide to Linux process scheduling
(2015)
Pro gradu -tutkielmaThe subject of this thesis is process scheduling in wide purpose operating systems. For many years kernel hackers all over the world tried to accomplish the seemingly infeasible task of achieving good interaction on desktop ... -
A Contingency Framework to Assure the User-Centered Quality and to Support the Design of Anti-Phishing Software
Acta Electronica Universitatis Tamperensis : 1286 (Tampere University Press, 2013)
ArtikkeliväitöskirjaVerkkohuijausten torjuntaan tarkoitettuja anti-phishing-ohjelmia käytetään yleisesti maksutapahtumien ja yksityisyydensuojan turvaamiseksi. Hyökkäystekniikat kehittyvät kuitenkin koko ajan, joten myös torjuntaohjelmia ... -
A framework for evaluating in-vehicle applications regarding safety
(2015)
Pro gradu -tutkielmaDriver distraction is a serious and growing hazard to road safety. With the rapid introduction of the new information, communication, and entertainment technologies, this problem is becoming more threatening in the coming ... -
A guideline for requirements management in GitHub with lean approach
(2014)
Pro gradu -tutkielmaGitHub is an online platform for collaborating and sharing code. In recent years its popularity has increased widely and both people and different size organizations utilize its powerful features. One of those features is ... -
A longitudinal study of text entry by gazing and smiling
(2014)
Pro gradu -tutkielmaFace Interface is a wearable device that combines the use of voluntary gaze direction and facial activations, for pointing and selecting objects on a computer screen, respectively. In this thesis a longitudinal study for ... -
A Method for Continuous Information Technology Supervision: The Case of the Estonian Financial Sector
Acta Electronica Universitatis Tamperensis : 1160 (Tampere University Press, 2012)
VäitöskirjaNykyään yritykset ja niiden liiketoiminta ovat yhä enemmän riippuvaisia tietotekniikan (IT) ratkaisuista, ja liiketoiminnan IT-riskit lisääntyvät edelleen. Rahoitusala on erityisen herkkä, koska se hallinnoi asiakkaan ... -
A method for the analysis of information use in source-based writing
(2012)
article -
A New Blind Adaptive Watermarking Method Based on Singular Value Decomposition
(IEEE, 2013)
conferenceObjectA blind watermarking method on the basis of Singular Value Decomposition is proposed in this paper. Each bit of a watermark is being enclosed in 4x4 blocks. The method modifies the both left and right orthonormal matrices ... -
A New Scalar Quantization Method for Digital Image Watermarking
(2016)
article -
A Portal Banking Solution Research, SQM and Inspire 2012 Tampere Conference
(2012)
bookAbstract The growth of the Internet as a financial business and core banking has done possible for everyday life for everyone. Core Banking solutions are banking applications on a platform enabling a phased, strategic ... -
A Prolog-based Approach for Analyzing XML Documents and Their Structure
(2011)
Pro gradu -tutkielmaSince the first version of XML was defined in 1998, it has become the most common tool for sharing and transferring data between applications in the Internet. It is also becoming more and more popular as a means to store ... -
A typology of music information for studies on information seeking
(2016)
article -
A web application solution for symbol file storing and distribution
(2013)
Pro gradu -tutkielmaData dispersion is a common problem in many companies. Valuable files of the enterprise are not well managed and decentralization of the files causes problems for finding and using the needed data. This implies that the ... -
Aah, kimochi!: Seksuaalisisältöisen mangan valinnasta, sijainnista ja luetteloinnista yleisissä kirjastoissa
(2011)
Pro gradu -tutkielmaTutkimuksen tarkoituksena oli tarkastella seksuaalisisältöistä mangaa, mitä se on ja kuinka sitä kirjastoissa käsitellään. Tutkimuksessa avattiin mangan ”kääntöpuolta” ja verrattiin sitä muuhun seksuaalisisältöiseen ... -
Academic Mindtrek Conference 2014 Open Source Software Liferay Solutions- E-Banking Account and MQ File System
(2014)
bookInternet banking enables customers to save time, take control of their personal finances and even help the environment by opting to receive electronic statements. For Internet banking users, online banking services is the ... -
Acceptance and Use of eLearning Technologies in Higher Education in East Africa
Acta Electronica Universitatis Tamperensis : 1481 (Tampere University PressTampereen yliopisto, 2014)
MonografiaväitöskirjaSähköisten oppimisteknologioiden hyväksyntä ja soveltaminen Itä-Afrikan korkeakoulutuksessa Sähköisten oppimisratkaisujen merkitystä Itä-Afrikan opetusjärjestelmän haasteissa ei voi korostaa liikaa. Oikeanlainen ratkaisujen ...