Essays about: "programming requirements"

Showing result 1 - 5 of 213 essays containing the words programming requirements.

  1. 1. A type-driven approach for sensitivity checking with branching

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Daniel Freiermuth; [2023-10-24]
    Keywords : Computer; science; computer science; thesis; differential privacy; type system; sensitivity; branching;

    Abstract : Differential Privacy (DP) is a promising approach to allow privacy preserving statistics over large datasets of sensitive data. It works by adding random noise to the result of the analytics. Understanding the sensitivity of a query is key to add the right amount of noise capable of protecting privacy of individuals in the dataset. READ MORE

  2. 2. Enhancing Accountability to Affected Populations through Donor Requirements : A grounded theory-based analysis of the current situation, donor motivations and bottlenecks around setting requirements, further constraints and how they could be overcome.

    University essay from Uppsala universitet/Teologiska institutionen

    Author : Clara Rattmann; [2023]
    Keywords : AAP; accountability to affected populations; humanitarian; accountability; participation; project design; proposal; funding; grant; donor requirement; disaster response; affected populations; donor; NGO; grounded theory;

    Abstract : Even though supporting affected populations is the raison d’etre for humanitarian action, organisations are frequently not accountable to populations they aim to serve. Despite several reform movements, the consultation and participation elements of accountability to affected populations (AAP), in particular, are still lacking. READ MORE

  3. 3. Using Quality Diversity in Genetic Programming to Improve Automatic Learning of Behaviour Trees

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Willemsen; [2023]
    Keywords : Behaviour Trees; Genetic Programming; Quality Diversity; Gedragsbomen; Genetische Programmering; Kwaliteitsdiversiteit; Beteendeträd; Genetisk Programmering; Kvalitetsmångfald;

    Abstract : One of the main purposes of the fields of Robotics and Artificial Intelligence is to develop solutions that can autonomously solve problems. An important part of this is synthesising behaviours of robots. Behaviour Trees are a tree structure that enables combining existing lower level behaviours into a high level behaviour through task switching. READ MORE

  4. 4. Optimizing the instruction scheduler of high-level synthesis tool

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zihao Xu; [2023]
    Keywords : Instruction scheduling; Scheduling algorithm; CGRA; High-level Sythnesis; SiLago; Algorithm-level Synthesis; Constraint programming; Instruktion schemaläggning; schemaläggning algoritm; CGRA; High-level Sythnesis; SiLago; Algoritm-nivå Synthesis; Constraint programmering;

    Abstract : With the increasing complexity of the chip architecture design for meeting different application requirements, the corresponding instruction scheduler of high-level synthesis tool needs to solve complex scheduling problems. Dynamically Reconfigurable Resource Array (DRRA) is a novel architecture based on Coarse-Grained Reconfigurable Architecture (CGRA) on SiLago platform, the instruction scheduler of Vesyla-II, the dedicated High-Level Synthesis (HLS) tool targets for DRRA needs to schedule the specific instruction sets designed for Distributed Two-level Control System (D2LC). READ MORE

  5. 5. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE