Search
Now showing items 1-10 of 129
deco - A decomposition program for NMR projection experiments
(2012-09-18)
In protein NMR high dimensional spectra are difficult to measure because long
measurement times and low signal to noise. To overcome this barrier fast acquisition
techniques have been developed. One of these is projection ...
A Decision Framework on Refactoring Architectural Technical Debt: Paying Back in Modularity- An Industrial Case Study
(2016-02-19)
Technical debt refers to sub-optimal solutions during software development where
there is a trade-o between short-term and long-term goals. Lately there has been a
few studies which identi es technical debt, however ...
SEMarbeta: Mobile Sketch-Gesture-Video Remote Support for Car Drivers
(2015-03-19)
Uneven knowledge distribution is often an issue in remote support systems, and this
sometimes creates the need for additional information layers extending beyond plain
videoconference and shared workspaces. This paper ...
City Safety Event Classification using Machine Learning
(2019-11-21)
City safety technology aims to reduce vehicle collisions using activated warnings
and braking based on automated detection of environmental threats. However, automatic
detection of tentative collisions may differ from ...
SWAP-IFC Secure Web Applications with Information Flow Control
(2015-04-01)
This thesis explores the possibility to create a library in Haskell which enables a static analysis with regards to information flow control. This library should then be compiled with Haste and produce secure JavaScript ...
Guidelines for Multilingual Software Development
(2012-08-06)
For software products to be effectively usable by an international audience, they must be localized, or translated, to suite the target user group’s culture and language. Multilingual software development is a vast topic ...
Automated quality-assessment for UML models in open source projects
(2019-11-19)
Unified Modelling Language (UML) provides the facility for software engineers to
specify, construct, visualize, and document the artifacts of a software system and to
facilitate communication of ideas [1, 2]. It is shown ...
Detecting security related code by using software architecture
(2018-03-20)
This thesis looks into automatic detection of security related code in order to eliminate
this problem. Since manual code detection is tiresome and introduces human
error we need a more efficient way of doing it. We ...
Designing a Visualization Application for Interaction
(2015-03-19)
Hidden problems can be found in informal communication networks (such as email), and
there is still much room for improvement on awareness of these problems. One area where
such problems can be found is in the speed at ...
Utilizing the Value State Dependence Graph for Haskell
(2012-08-21)
Modern compilers use control flow based intermediate representations for representing
programs during code optimization and generation. However, many optimizations
tend to rely not on the explicit representation of control ...