Circular Image

64 records found

We present a decentralised alternative to the winner-takes-everything dynamics of social media platforms.

For 25 years there have been continuous attempts to ...

Secure Task Management in FreeRTOS

A RISC-V Core Approach with Physical Memory Protection

The demand for embedded devices, such as intelligent sensors, smartwatches, medical implants, and computing chips in cars, has been rising steadily in the past and is expected to continue for the coming decade. Their high and increasing degree of connectivity expands the attack s ...
This thesis presents the development and evaluation of a real-time neural network-based audio classification system designed on an NXP HW board to distinguish emergency response vehicles by their sirens from other vehicles. At the core of the system is a deep learning model that ...
Deep learning models are now widely deployed on edge IoT devices. However, most of these models are trained under supervised conditions and can only recognize seen classes learned from the training stage. Zero-shot learning (ZSL) is a popular method for identifying unseen classes ...

What about Haskell bugs?

Adapting existing bug taxonomies to Haskell’s features and community

The classification of bugs in functional languages is an understudied area, as opposed to imperative counterparts, such as Java. This paper acts as an initial step to cover this gap into two complementary directions. First, a dataset of 142 bugs from 10 Haskell FOSS repositories ...

Evaluating Haskell Metrics

Looking for correlations between bug occurrences and code metrics

This study explores the use of Code Churn and Pattern Size (PSIZ) metrics to identify bug-prone areas in Haskell codebases. The primary research questions addressed are whether these metrics can effectively predict areas of code instability and potential bugs. Our contributions i ...

Topic Classification of Publications

Identifying publication topics based on existing journals

Accurate topic classification is crucial in the scientific community when it comes to finding relevant journals. However, the efficiency and accuracy of topic classification of publications do not seem to be at its best performance, especially with the fast-paced rise in the quan ...
The growth of academic publications, heterogeneity of datasets and the absence of a globally accepted organization identifier introduce the challenge of affiliation disambiguation in bibliographic databases. In this paper, we create a baseline using the currently implemented algo ...

Towards More Effective Querying of Medical Literature in Alexandria3K

How useful can Alexandria3K be for performing literature reviews

The Alexandria3K library, a versatile Python-based tool, has been expanded to include the integra- tion of the PubMed dataset, enriching its capabil- ities in the analysis of scientific papers. Origi- nally supporting major datasets like Crossref and US patents, and smaller yet s ...
This study addresses the gap for fine-grained emotion recognition in immersive environments utilizing solely data from on-board sensors. Two data representations of users eyes are utilized, including periocular recordings and eye movements (gaze estimation and pupil measurements) ...

Author Name Disambiguation using Large Language Models

Contributions to a system for open reproducible publication research

Author name disambiguation, otherwise described as (publication) record linking, is a problem that has had considerable research dedicated to its solv- ing. Author attributions, calculating research met- rics and conducting literature reviews are amongst processes that experience ...
This thesis presents LightLetter, a system that is designed for recognizing fingertip air-writing of both numbers and letters. This provides a cost-effective and privacy-conscious method for interacting with public devices, such as touchscreens. The current iteration of LightLett ...
Hidden spy cameras are a growing worldwide threat to people’s intimacy and privacy. With the growing interest in full-screen devices and the underlying development of under-screen cameras, a new type of potential security risk is introduced. Recent smartphones such as the ZTE AXO ...

Expressing Intent

An evaluation of the Arm Machine Readable Specification

The behaviour of software is intrinsically linked to the hardware it runs on. As hardware innovations continuously change the landscape of computing, software has to adapt to these changes. Running legacy software on new hardware requires either the old hardware to be emulated, o ...

Proving correctness of refactoring tuples to records

A correct-by-construction approach on a Haskell-like language

Refactoring is a useful tool for increasing the overall quality of software without making changes to how it interacts with the environment. To verify that a refactoring operation correctly transforms an expression, one can provide a formal proof. Using Agda, a dependently-typed ...

Maybe a List would be better?

Correct by construction Maybe to List refactorings in a Haskell-like language

This paper concerns itself with correct by construction refactoring of Maybe values to List values in a Haskell-like language (HLL) as a case study on data-oriented refactorings. Our language makes use of intrinsically-typed syntax and de Bruijn indices for variables. Operational ...

Refactoring with confidence

Creating and proving the correctness of a refactoring to add arguments to a function in a functional language

Refactoring tools are an important tool for developers, but their reliability can be questionable at times. In this paper, we show that it is feasible to formally verify refactoring tools using computer-aided proofs. To this end, we create a Haskell-like language and a refactorin ...

Formally proving the correctness of the (un)currying refactoring

Using Agda with a simple Haskell-like programming language

When designing critical software, great care must be taken to guarantee its correctness. Refactoring is one of the techniques used to improve code readability, maintainability, and other factors without changing functionality. Thus, to ensure that it is properly applied, automate ...

Don’t bind yourself to do notation!

Using Agda to Prove Correctness of Refactorings on Monads

This paper provides a refactoring from do notation to >>= operators and proves that this refactoring maintains observational equivalence. As programs grow ever larger and more complex, there is a growing need to automatically apply refactorings to these programs in a depend ...