Essays about: "körtid"

Showing result 1 - 5 of 65 essays containing the word körtid.

  1. 1. Functional Programming Languages and the JVM : Comparing Functional Language Compilation Techniques for the JVM

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Asta Olofsson; [2023]
    Keywords : Compilation; Functional Programming; Java; Kompilering; Funktionell Programmering; Java;

    Abstract : Because of its security, high availability, and automatic memory management, the JVM (Java Virtual Machine) is a desirable execution environment. However, since the JVM was originally made for Java, which is an objectoriented language, it is hard for languages with other paradigms to run on it. READ MORE

  2. 2. The Effect of Noise Levels on the Performance of Shor’s Algorithm

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Höstedt; Tobias Ljunggren; [2023]
    Keywords : Bachelor’s thesis; Quantum Computing; Shor’s algorithm; Noise; Cryptography; Qiskit; Kandidatexamensarbete; Kvantdatorer; Shors algorithm; Brus; Kryptografi; Qiskit;

    Abstract : Advanced enough quantum computers promise to revolutionise fields such as cryptography, drug discovery and simulations of complex systems. Quantum computers are built on qubits which are fragile and susceptible to error-inducing interference, which is called noise. READ MORE

  3. 3. Robust Non-Linear State Estimation for Underwater Acoustic Localization : Expanding on Gaussian Mixture Methods

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Diogo Antunes; [2023]
    Keywords : Robust state estimation; Underwater localization; Target tracking; Gaussian mixture; AUV; Estimação robusta de estado; Localização subaquática; Rastreamento de alvos; Mistura Gaussiana; AUV; Robust tillståndsuppskattning; Undervattenslokalisering; Målspårning; Gaussisk blandning; AUV;

    Abstract : Robust state estimation solutions must deal with faulty measurements, called outliers, and unknown data associations, which lead to multiple feasible hypotheses. Take, for instance, the scenario of tracking two indistinguishable targets based on position measurements, where each measurement could refer to either of the targets or even be a faulty reading. READ MORE

  4. 4. Decompiling Go : Using metadata to improve decompilation readability

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mattias Grenfeldt; [2023]
    Keywords : Decompilation; Go; Runtime Metadata; Reverse Engineering; Dekompilering; Go; Körtidsmetadata; Reverse Engineering;

    Abstract : Malware written in Go is on the rise, and yet, tools for investigating Go programs, such as decompilers, are limited. A decompiler takes a compiled binary and tries to recover its source code. Go is a high-level language that requires runtime metadata to implement many of its features, such as garbage collection and polymorphism. READ MORE

  5. 5. Implementing the chirality-flow formalism for tree-level massless QCD in MadGraph

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Teoretisk partikelfysik - Geonomgår omorganisation

    Author : Adam Warnerbring; [2023]
    Keywords : Theoretical physics; The chirality-flow formalism; Physics and Astronomy;

    Abstract : The chirality-flow formalism provides a simple but efficient way to rewrite and evaluate Feynman diagrams and has recently been shown to also optimize automated numerical scattering matrix element evaluations in massless tree-level QED. In this thesis we extend the numerical QED model to massless tree-level QCD in the MadGraph5_aMC@NLO framework. READ MORE