Examensarbeten efter program/Theses by program


Klicka på blå triangel för att expandera/minimera/Click on the blue triangle to expand/minimize.


ProgramAuthorTitleYear
Hide details for LitteraturLitteratur
Agadagba, EfeogheneIdentity Construction on Social Network Sites: Facebook2011
Chohan, Imran RiazIdentity, hyperreality and Science fiction: Matrix and Neuromancer2012
Erel, SarperFrom 2001 A Space Odyssey to Minority Report: Reflections of Imagining Future on Science Fiction 2012
Ghazouani, Anas ElHow Meta-Films Can Serve Cinema2012
Jansson, RobinSilence in Adventure Games and Space2012
Kiraly, ThomAn Angel Passes By: Posthuman and Acousmatic Voices in Digitally Mediated Contemporary Live Poetry2012
Mahzoon, AlirezaManipulated Private and Public Spheres: The Use of Control Technologies by Totalitarian Regimes 2012
Ogungbemi, Funke Jaiyeola neeCollaborative Virtual Environments: Identity Construction in Online Environments with a Focus on Facebook2011
Wu, DiWhat Distinguishes Humans from Artificial Beings in Science Fiction World2012
, Ali TehraniAlternative media: Empowerment in individuals in totalitarian societies.2012
Hide details for Magisterprogram Datavetenskap, 40 poäng/Master programme Computer ScienceMagisterprogram Datavetenskap, 40 poäng/Master programme Computer Science
Agushi, CamrieInnovation inom Digital Rights Management2005
Andersson, JonasWeb Services - Aspekter på nya affärsmöjligheter2002
Baca, DejanSoftware Security Analysis - Managing source code audit2004
Bergstrand, FredrikLocalization of Spyware in Windows Environments2004
Bergstrand, JohanLocalization of Spyware in Windows Environments2004
Branca, LucaA multi-agent system playing Settlers of Catan2006
Carlsson, JimmySustainability and service-oriented systems in network-centric environments2003
Cazorla, Hector VillenaMultiple Potential Fields in Quake 2 Multiplayer2006
Chervyakov, AnatolySimulation-based evaluation of berth allocation policies of container terminals2003
Dahlberg, AnnikaKopieringsskydd och lagar - rätt väg i kampen mot piratkopieringen?2004
Edström, TobiasAdopting Mobile Internet? Findings from a Study on Mobile Internet Services Using a User Centred Perspective2003
Ekberg, SiriInvasion of Privacy: Spam - one result of bad privacy protection2003
Farooq, Khan H MEngineering of Context Dependent Quality of Service (QoS) 2006
Fransson, ElisabethKrav på kraven - Varför kravspecifikationer inte uppdateras och vad det kan ge för konsekvenser2004
Fredriksson, MartinActive Documents and their Applicability in Distributed Environments1998
Ganti, SudhirMultimedia Security in P2P Networks2006
Gunnarsson, AnnickaInvasion of Privacy: Spam - one result of bad privacy protection2003
Gunnarsson, HåkanLocalization of Spyware in Windows Environments2004