Circular Image

K.G. Langendoen

77 records found

Mobile blockchain transactions require low latency
for practical deployment. This paper presents a
smartphone-native Trustchain system developed as
part of a collaborative research project where five
students implement Trustchain from scratch, each
optimizing ...
Hyperscalers Meta and Google have observed a rare but severe phenomenon in cores throughout their processor fleets: Silent Data Errors (SDEs). Recent research efforts have indicated that marginal timing failures are the main cause of these SDEs. Currently, the underlying def ...

Benchmarking Geo-distributed Databases

Evaluating Performance using the Product-Parts-Supplier Workload

Existing evaluations of geo-distributed databases still rely almost exclusively on standard limited workloads such as TPC-C and YCSB+T, which reveal little information about the true cost of wide-area coordination. In this paper, we present a configurable benchmarking framework b ...

TrustChain for Smartphones

Measuring reconnection latency when the network is interrupted

TrustChain is a scalable, lightweight blockchain architecture that avoids global consensus by maintaining a personal chain of co-signed interactions for each peer, forming a directed acyclic graph. While its structure makes it promising for mobile and resource constrained environ ...

Scaling TrustChain to One Million Blocks on Mobile Devices

Storage Performance Evaluation and Benchmarking

Smartphones offer limited storage and memory, con- straints that conventional blockchains struggle to meet, yet they are also the devices where user- owned transaction chains promise the most value. We present the first empirical study of TrustChain, a DAG-based per-peer ledger r ...

Communication Protocol Impact on Energy Efficiency of Blockchain Application

Analysis of Energy Efficiency of Android Blockchain Application Using UDP or QUIC

Blockchain is already a widely adopted solution which can achieve decentralized storage in trustless settings. However, it is infamous for its high energy demands, making it difficult to operate on mobile phones with limited battery life. Among many design decisions in a blockcha ...
Blockchain technologies offer decentralized, secure, and transparent transaction sys tems but face significant scalability challenges, especially in mobile and peer-to-peer environments. Directed Acyclic Graph (DAG)-based protocols, such as Trustchain, present a promising alter ...

Benchmarking geo-distributed databases

Evaluation using the DeathStar hotel reservation benchmark

As modern applications become more global and resource intensive, geo-distributed databases have become critical for fast, reliable data storage. Evaluating the performance of these databases through traditional benchmarks such as TPC-C and YCSB-T is not sufficient to expose all ...

MovR as a Benchmark for Geo-Distributed Databases

Performance Evaluation and Insights

Distributed systems are vital for handling large-scale data and rely on geo-distributed databases to ensure low latency and high availability. Traditional benchmarks, such as TPC-C and YCSB-T, are not designed to handle the complexities of geo-distributed environments and do not ...

DeathStar Movie for Geo-Distributed Databases

Stressing databases using a movie review site

Geo-distributed databases offer the scalability and low latency that contemporary applications demand, but are challenging to implement. It is therefore crucial that they are tested well. Established benchmarks, such as TPC-C and YCSB-T, are limited and do not cover the entire se ...

Benchmarking geo-distributed databases

Evaluation using the SmallBank benchmark

In recent years, applications have started using geo-distributed databases, even though their behavior under different workloads remains complex. Therefore, this project analyses how several databases handle transactional workloads using the SmallBank benchmark. We implement and ...

We present a decentralised alternative to the winner-takes-everything dynamics of social media platforms.

For 25 years there have been continuous attempts to ...

Secure Task Management in FreeRTOS

A RISC-V Core Approach with Physical Memory Protection

The demand for embedded devices, such as intelligent sensors, smartwatches, medical implants, and computing chips in cars, has been rising steadily in the past and is expected to continue for the coming decade. Their high and increasing degree of connectivity expands the attack s ...
This thesis presents the development and evaluation of a real-time neural network-based audio classification system designed on an NXP HW board to distinguish emergency response vehicles by their sirens from other vehicles. At the core of the system is a deep learning model that ...
Deep learning models are now widely deployed on edge IoT devices. However, most of these models are trained under supervised conditions and can only recognize seen classes learned from the training stage. Zero-shot learning (ZSL) is a popular method for identifying unseen classes ...

Evaluating Haskell Metrics

Looking for correlations between bug occurrences and code metrics

This study explores the use of Code Churn and Pattern Size (PSIZ) metrics to identify bug-prone areas in Haskell codebases. The primary research questions addressed are whether these metrics can effectively predict areas of code instability and potential bugs. Our contributions i ...

What about Haskell bugs?

Adapting existing bug taxonomies to Haskell’s features and community

The classification of bugs in functional languages is an understudied area, as opposed to imperative counterparts, such as Java. This paper acts as an initial step to cover this gap into two complementary directions. First, a dataset of 142 bugs from 10 Haskell FOSS repositories ...

Towards More Effective Querying of Medical Literature in Alexandria3K

How useful can Alexandria3K be for performing literature reviews

The Alexandria3K library, a versatile Python-based tool, has been expanded to include the integra- tion of the PubMed dataset, enriching its capabil- ities in the analysis of scientific papers. Origi- nally supporting major datasets like Crossref and US patents, and smaller yet s ...