- document
-
Hutiri, Wiebke (author)From smart phones to speakers and watches, Edge Al is deployed on billions of devices to process large volumes of personal data efficiently, privately and in real-time. While Edge Al applications are promising, many recent incidents of bias in Al systems caution that Edge Al too, may systematically discriminate against groups of people based on...doctoral thesis 2023
- document
-
Holten, Lucas (author)Writing software that follows its specification is important for many applications. One approach to guarantee this is formal verification in a dependently-typed programming language. Formal verification in these dependently-typed languages is based on proof writing. Sadly, while proofs are easy to check for computers, writing proofs can be...master thesis 2023
- document
-
Bezsilla, Janos (author)Nowadays, many space missions require highly accurate pointing for Earth observation or cosmic vision purposes. However, the vibration environment from a spacecraft's structure and reaction wheels can cause disturbances in its line-of-sight stability and severely impact image quality. Additionally, these effects are not known precisely due to...master thesis 2023
- document
-
Miranda Challapa, Victor Hugo (author)Tailings dam failures are one of the most destructive phenomena in terms of the number of victims and the environmental impact generated. Over the years, different causes have been identified, with flow liquefaction being a prominent factor to consider when assessing the stability of tailings deposits. Due to the complex nature of these events,...master thesis 2023
- document
-
Padilla Cancio, José (author)This paper concerns itself with correct by construction refactoring of Maybe values to List values in a Haskell-like language (HLL) as a case study on data-oriented refactorings. Our language makes use of intrinsically-typed syntax and de Bruijn indices for variables. Operational semantics are defined using big step semantics. We define a...bachelor thesis 2023
- document
-
Jóźwik, Michał (author)When designing critical software, great care must be taken to guarantee its correctness. Refactoring is one of the techniques used to improve code readability, maintainability, and other factors without changing functionality. Thus, to ensure that it is properly applied, automated tools are used to perform refactoring. To ensure that the code...bachelor thesis 2023
- document
-
Juhošová, Sára (author)Formal verification is a powerful tool for ensuring program correctness but is often hard to learn to use and has not yet spread into the commercial world. This thesis focuses on finding an easy-to-use solution to make formal verification available in popular programming language ecosystems. We propose a solution where users can write code in an...master thesis 2023
- document
-
Frijns, Jesper (author)Laser satellite communications for ground-to-ground and ground-to space links is influenced by atmospheric turbulence. Typically, theoretical models are used to predict link performance and the influence of the atmosphere on variables such as beam wander, spot size and scintillation at the receiver. These variables are used as input for system...master thesis 2023
- document
-
Stavridou, EVDOKIA (author)Although relevant information regarding the curtain walls structural damage state is available, hardly any data referring to the seismic loading effect on the overall façade performance is found in the literature. The present research attempts to assess the unitised curtain walls seismic performance by identifying the occurring damage mechanisms...master thesis 2023
- document
-
Lovato, S. (author)The increasing size of today's ships is a major concern for navigation in confined waters. In order to ensure safe manoeuvres, port authorities prescribe, among others, a minimum under-keel clearance that must be maintained by the ships during navigation. However, the seabed of ports situated at the estuaries or along rivers is often covered by...doctoral thesis 2023
- document
-
Mathiesen, Frederik Baymler (author), Calvert, S.C. (author), Laurenti, L. (author)Providing non-trivial certificates of safety for non-linear stochastic systems is an important open problem. One promising solution to address this problem is the use of barrier functions. Barrier functions are functions whose composition with the system forms a Martingale and enable the computation of the probability that the system stays...journal article 2023
- document
-
Shukla, Apoorv (author), Hudemann, Kevin (author), Vagi, Zsolt (author), Hugerich, Lily (author), Smaragdakis, G. (author), Hecker, Artur (author), Schmid, Stefan (author), Feldmann, Anja (author)We introduce a runtime verification framework for programmable switches that complements static analysis. To evaluate our approach, we design and develop P6, a runtime verification system that automatically detects, localizes, and patches software bugs in P4 programs. Bugs are reported via a violation of pre-specified expected behavior that...journal article 2023
- document
-
Augusto da Silva, F. (author)In recent years, advances in technology have enabled the employment of automated systems to control driving tasks. The idea of electronic devices having complete control over a vehicle promises to change the concept of mobility soon. However, allowing computers to control all the tasks in a vehicle demands sophisticated systems and significant...doctoral thesis 2022
- document
-
de Haas, Olav (author)Formal verification of imperative programs can be carried out on paper by annotating programs to obtain an outline of a proof in the style of Hoare. This process has been mechanized by the introduction of Separation Logic and computer assisted verification tools. However, the tools fail to achieve the readability and convenience of manual paper...master thesis 2022
- document
-
Reukers, Matthijs (author)Tydi is an open specification for streaming dataflow designs in digital circuits, allowing designers to express how composite and variable-length data structures are transferred over streams using clear, data-centric types. This provides a higher-level method for defining interfaces between components as opposed to existing bit- and byte-based...master thesis 2022
- document
-
Massar, Marnix (author)agda2hs is a tool which translates a subset of Agda to readable Haskell. Using agda2hs, programmers can implement libraries in this subset of Agda, formally verify them, and then convert them to Haskell. In this paper we present a new, verified implementation of the lens data type, which is used to access data structures in a readable yet...bachelor thesis 2022
- document
-
Schifferstein, Michelle (author)The formal verification of concurrent programs is of particular importance, because concurrent programs are notoriously difficult to test. Because Haskell is a purely functional language, it is relatively easy to reason about the correctness of such programs and write down manual proofs. However, since these methods are still prone to error,...bachelor thesis 2022
- document
-
Fransen, M.P. (author), Langelaar, M. (author), Schott, D.L. (author)In calibration of model parameters for discrete element method (DEM) based models the focus lies on matching the mean key performance indicator (KPI) values from laboratory experiments to those from simulation results. However, due to the stochastic nature of granular processes experimental results can show large variances. To include...journal article 2022
- document
-
Harris, Steve (author), Kanders, Linda (author), Vassallo, Fabrizio (author), Cipollina, Andrea (author), Ebrahimi, S. (author), Xevgenos, Dimitris (author)The European Union's Environmental Technology Verification (ETV) program aims to foster innovative environmental technologies to reach the market and reassure potential users. This paper presents an investigation of using ETV for three technologies, being developed within the EU Zero Brine research and innovation project. The technologies...journal article 2022
- document
-
Toussaint, W. (author), Ding, Aaron Yi (author)Automated speaker recognition uses data processing to identify speakers by their voice. Today, automated speaker recognition is deployed on billions of smart devices and in services such as call centres. Despite their wide-scale deployment and known sources of bias in related domains like face recognition and natural language processing, bias in...conference paper 2022