- document
-
Groenewegen, D.M. (author)Information systems store and organize data, and manage business processes concerned with that data. Information systems aim to support operations, management and decision-making in organizations. Web applications are ideal for implementing information systems. Although existing web frameworks provide abstractions for creating web applications,...doctoral thesis 2023
- document
-
de Graaf, Daan (author)Graph databases are systems to efficiently store and query large graphs. As graph databases grow in popularity, they are used to answer increasingly diverse and complex queries. However, graph databases typically have a very limited query language that cannot express arbitrary algorithms. As a result, many users treat the database as a storage...master thesis 2023
- document
-
Georgescu, Calin (author)Kotlin is a programming language best known for its interoperability with Java, as well as the measurable improvements it offers over it. Since it became Android’s go-to language in 2019, the popularity and impact of Kotlin have risen greatly. Amidst this surge in popularity, the Kotlin developer team is working on a new version of the compiler...master thesis 2023
- document
-
LIU, ZHIYANG (author)Atomics is an important primitive for programming languages like C++ to develop concurrent software. Atomic variables, together with weak memory models allow for a bigger space for instruction reordering and compiler optimizations. However, the current compilers like LLVM do not support many transformations of atomics, which may lose chances of...master thesis 2023
- document
-
Szkudlarek, Sacha (author)This thesis presents a novel formulation to study the qubit-mapping problem (QMP). The presented for- mulation redefines the problem in terms of density matrices which represent the quantum algorithm and the underlying architecture—allowing the implementation of techniques from quantum information theory to es- tablish a bounded metric space for...master thesis 2023
- document
-
Kortbeek, V. (author)The Internet of Things (IoT) is taking the world by storm, from smart lights to smart plant monitoring. This revolution is not only present in consumers’ homes, but companies are also looking for more and more ways to monitor every aspect of their production process. This transition to ubiquitous monitoring is made possible by extremely low...doctoral thesis 2023
- document
-
Dreef, Matti (author)Quantum computing is a promising means of satisfying the ever-increasing need for more and faster computations. While some specific applications can already benefit from quantum computing today, a large-scale general-purpose quantum computer is yet to be developed. Many different technologies are being explored to reach this goal, color centers...master thesis 2023
- document
-
Reinders, J.S. (author)Compilers transform a human readable source language into machine readable target language. Nanopass compilers simplify this approach by breaking up this transformation into small steps that are more understandable, maintainable, and extensible. We propose a semantics-driven variant of the nanopass compiler architecture exploring the use a...conference paper 2023
- document
-
Gomony, Manil Dev (author), de Putter, Floran (author), Gebregiorgis, A.B. (author), Paulin, Gianna (author), Mei, Linyan (author), Jain, Vikram (author), Hamdioui, S. (author), Bishnoi, R.K. (author), Sanchez, Victor (author)With the rise of deep learning (DL), our world braces for artificial intelligence (AI) in every edge device, creating an urgent need for edge-AI SoCs. This SoC hardware needs to support high throughput, reliable and secure AI processing at ultra-low power (ULP), with a very short time to market. With its strong legacy in edge solutions and open...conference paper 2023
- document
-
Bandic, M. (author), Almudever, Carmen G. (author), Feld, S. (author)To execute quantum circuits on a quantum processor, they must be modified to meet the physical constraints of the quantum device. This process, called quantum circuit mapping, results in a gate/circuit depth overhead that depends on both the circuit properties and the hardware constraints, being the limited qubit connectivity a crucial...journal article 2023
- document
-
Gomony, Manil Dev (author), Gebregiorgis, A.B. (author), Fieback, M. (author), Geilen, Marc (author), Stuijk, Sander (author), Richter-Brockmann, Jan (author), Bishnoi, R.K. (author), Taouil, M. (author), Hamdioui, S. (author)This paper addresses one of the directions of the HORIZON EU CONVOLVE project being dependability of smart edge processors based on computation-in-memory and emerging memristor devices such as RRAM. It discusses how how this alternative computing paradigm will change the way we used to do manufacturing test. In addition, it describes how these...conference paper 2023
- document
-
Reukers, Matthijs (author)Tydi is an open specification for streaming dataflow designs in digital circuits, allowing designers to express how composite and variable-length data structures are transferred over streams using clear, data-centric types. This provides a higher-level method for defining interfaces between components as opposed to existing bit- and byte-based...master thesis 2022
- document
-
TIAN, YONGDING (author)Transferring composite data structures with variable-length fields often requires designing non-trivial protocols that are not compatible between hardware designs. When each project designs its own data format and protocols the ability to collaborate between hardware developers is diminished, which is an issue especially in the open-source...master thesis 2022
- document
-
Zimmerhackl, Lukas (author)Dependent programming languages such as Agda show a lot of promise in creating new ways of writing code, but currently suffer from a lack of support and features. In this paper we attempt to create a new back-end for Agda targeting Java which has a huge and thriving ecosystem.<br/><br/>We implement the new back-end for Agda in Haskell and we...bachelor thesis 2022
- document
-
Meluzzi, Matteo (author)Dependently typed languages such as Agda have the potential to revolutionize the way we write software because they allow the programmer to catch more bugs at compile time than classical languages. Nonetheless, dependently typed languages are hardly used in practice. One of the reasons is the lack of mature compilers for them.<br/>This paper...bachelor thesis 2022
- document
-
Kowalewski, Przemysław (author)STOKE is one of the Superoptimizers which are programs that given a function and a set of instructions of a processor, traverse through a space of programs that compute a given function and try to find the optimal usually in terms of execution speed or size of the binary. Authors of STOKE make some extraordinary claims. They suggest that it is...bachelor thesis 2022
- document
-
Hartman, Toine (author)Pattern matching is the act of checking if a value is in the set of values described by a pattern. Many programming languages provide constructs to pattern match on program values. Pattern matching constructs appear in different variants. Stratego, a term rewriting language, features first-class pattern matching, which attempts to match a...master thesis 2022
- document
-
Krol, A.M. (author), Sarkar, A. (author), Ashraf, I. (author), Al-Ars, Z. (author), Bertels, K.L.M. (author)Unitary decomposition is a widely used method to map quantum algorithms to an arbitrary set of quantum gates. Efficient implementation of this decomposition allows for the translation of bigger unitary gates into elementary quantum operations, which is key to executing these algorithms on existing quantum computers. The decomposition can be used...journal article 2022
- document
-
Kortbeek, V. (author), Ghosh, Souradip (author), Hester, Josiah (author), Campanoni, Simone (author), Pawełczak, Przemysław (author)Intermittently operating embedded computing platforms powered by energy harvesting require software frameworks to protect from errors caused by Write After Read (WAR) dependencies. A powerful method of code protection for systems with non-volatile main memory utilizes compiler analysis to insert a checkpoint inside each WAR violation in the...conference paper 2022
- document
-
Khammassi, N. (author), Ashraf, I. (author), van Someren, J. (author), Nane, R. (author), Krol, A.M. (author), Rol, M.A. (author), Lao, L. (author), Bertels, K.L.M. (author), Almudever, Carmen G. (author)With the potential of quantum algorithms to solve intractable classical problems, quantum computing is rapidly evolving, and more algorithms are being developed and optimized. Expressing these quantum algorithms using a high-level language and making them executable on a quantum processor while abstracting away hardware details is a...journal article 2022