Searched for: department%3A%22Software%255C%2Band%255C%2BComputer%255C%2BTechnology%22
(1 - 20 of 67)
- document
-
Huang, H. (author)Complex networks are a special type of graph that frequently appears in nature and in many different fields of science and engineering. Studying complex networks is the key to solve the problems in these fields. Complex networks have unique features which we cannot find in regular graphs, and the study of complex networks gives rise to many...master thesis 2015
- document
-
Berger, M.E.R. (author)Using the histogram procedure, this work studies performance determining factors in computing in parallel on SIMD and SIMT devices. Modern graphics pro-cessing units (GPUs) support SIMT, multiple threads running the same instruction, whereas central processing units (CPUs) use SIMD, in which one instruction op-erates on multiple operands. As...master thesis 2015
- document
-
Shen, J. (author)Heterogeneous platforms are mixes of different processing units in a compute node (e.g., CPUs+GPUs, CPU+MICs) or a chip package (e.g., APUs). This type of platforms keeps gaining popularity in various computer systems ranging from supercomputers to mobile devices. In this context, improving their efficiency and usability has become increasingly...doctoral thesis 2015
- document
-
Roest, C. (author)Cyber-Physical Systems (CPS) integrate physical processes, sensors, and embedded computers to facilitate advanced control systems such as autonomous cars and smart cities. Communication in CPS has tight constraints regarding reliability and latency, while traditional networking primitives can not guarantee these constraints. We base our thesis...master thesis 2015
- document
-
Wang, X. (author)Ambient energy-harvesting technology is a promising approach to keep wireless sensor networks (WSNs) operating perennially. Depending on the harvesting source, nodes can either be active (alive) or inactive (dead) at any instant in such Energy-Harvesting WSNs (EH-WSNs). Thus, even in a static deployment of EH-WSNs, the network topology is no...master thesis 2015
- document
-
Morales-España, G. (author), Davidson, M. (author), Ramírez-Elizondo, L. (author), De Weerdt, M.M. (author)This document is an online companion for the paper "Robust Unit Commitment with Dispatchable Wind: An LP Reformulation of the Second-stage".report 2015
- document
-
Rennings, D.J.A. (author), Kassing, S.A. (author)The Centre for Advanced Studies of IBM Amsterdam (IBM CAS) has an ambitious plan to revolutionize the workforce. Within the Inclusive Enterprise research line they aim to investigate and map the factors that influence employee well-being. Among these factors, we may find environmental factors that can be coupled to measurable quantities such as...bachelor thesis 2015
- document
- Capotă, M. (author) doctoral thesis 2015
- document
-
Van Bekkum, R. (author), Van Belzen, J.C. (author), Li, H.Y.V. (author)With the dawn of the era of the Internet of Things(IoT) more everyday objects are equipped with technology that allows them to be connected to the Internet and therefore enabling (remotely) controlling or gathering data from these objects. DSP Innovation B.V. aims to respond on this emerging development by introducing a second generation IoT...bachelor thesis 2015
- document
-
Van Bruggen, C. (author), Feddes, N.F. (author), Vermeer, M. (author)Privacy is dying. Internet users have been trying more and more to keep governments' and security agencies' prying eyes away from their online activity. Anonymity - Internet anonymity, specifically - has therefore gained traction in recent years. In order to further contribute to the effort of Internet privacy and anonymity, this project's goal...bachelor thesis 2015
- document
-
Van Beusekom, M. (author), Herckenrath, N.C. (author)Due to the rise of smartphone technology, numerous citizens carry Internet-enabled recording equipment with them at all times. Should atrocities be committed by the the government, they would have a hard time to cover-up the truth without blocking the Internet. Governments have demonstrated their ability to restrict access to the Internet during...bachelor thesis 2015
- document
-
Chen, C. (author)The aggressive semiconductor technology scaling provides the means for doubling the amount of transistors on a single chip each and every 18 months. To efficiently utilize these vast chip resources, Multi-Processor Systems on Chip (MPSoCs) integrated with a Network-on-Chip (NoC) communication infrastructure have been widely investigated. However...doctoral thesis 2015
- document
-
Walraven, E.M.P. (author), Spaan, M.T.J. (author)Integration of renewable energy in power systems is a potential source of uncertainty, because renewable generation is variable and may depend on changing and highly uncertain weather conditions. In this paper we present and evaluate a new method to schedule power-demanding tasks with release times and deadlines under uncertainty, in order to...conference paper 2015
- document
-
Pham-Quoc Cuong, P. (author)Heterogeneous multicore systems are becoming increasingly important as the need for computation power grows, especially when we are entering into the big data era. As one of the main trends in heterogeneous multicore, hardware accelerator systems provide application specific hardware circuits and are thus more energy efficient and have higher...doctoral thesis 2015
- document
-
Loukas, A. (author)We have recently seen a surge of research focusing on the processing of graph data. The emerging field of signal processing on graphs focuses on the extension of classical discrete signal processing techniques to the graph setting. Arguably, the greatest breakthrough of the field has been the extension of the Fourier transform from time signals...doctoral thesis 2015
- document
-
Burghouwt, P. (author)Botnets play an important role in modern Internet-related cybercrime. A botnet consists of a group of infected computers, referred to as bots. The bots are remotely controlled and deployed in malicious activities, such as DDoS attacks, spam, and espionage. Clever design of the botnet C&C (Command and Control) infrastructure, combined with the...doctoral thesis 2015
- document
-
Neron, P.J.M. (author), Tolmach, A.P. (author), Visser, E. (author), Wachsmuth, G. (author)We describe a language-independent theory for name binding and resolution, suitable for programming languages with complex scoping rules including both lexical scoping and modules. We formulate name resolution as a two stage problem. First a language-independent scope graph is constructed using language-specific rules from an abstract syntax...report 2015
- document
-
Tao, K. (author)In the past decade, the Social Web has evolved into both an essential channel for people to exchange information and a new type of mass media. The immense amount of data produced presents new possibilities and challenges: algorithms and technologies need to be developed to extract and infer useful information from the Social Web. One of the main...doctoral thesis 2014
- document
-
Bien, V.Q. (author)Because of high data rate multimedia applications such as HD and UHDTV, online games, etc., the future home networks are expected to support short-range gigabit transmission. With the worldwide availability of 5 GHz spectrum at the 60 GHz band, it creates the opportunity for a promising air interface for future home networks. This dissertation...doctoral thesis 2014
- document
-
Zaykov, P.G. (author)In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor (GPP), local memory, and one or more...doctoral thesis 2014
Searched for: department%3A%22Software%255C%2Band%255C%2BComputer%255C%2BTechnology%22
(1 - 20 of 67)