4,525 research outputs found

    Normalization by Evaluation in the Delay Monad: A Case Study for Coinduction via Copatterns and Sized Types

    Get PDF
    In this paper, we present an Agda formalization of a normalizer for simply-typed lambda terms. The normalizer consists of two coinductively defined functions in the delay monad: One is a standard evaluator of lambda terms to closures, the other a type-directed reifier from values to eta-long beta-normal forms. Their composition, normalization-by-evaluation, is shown to be a total function a posteriori, using a standard logical-relations argument. The successful formalization serves as a proof-of-concept for coinductive programming and reasoning using sized types and copatterns, a new and presently experimental feature of Agda.Comment: In Proceedings MSFP 2014, arXiv:1406.153

    Building the knowledge base for environmental action and sustainability

    Get PDF

    Diversity in Computer Science

    Get PDF
    This is an open access book that covers the complete set of experiences and results of the FemTech.dk research which we have had conducted between 2016-2021 – from initiate idea to societal communication. Diversity in Computer Science: Design Artefacts for Equity and Inclusion presents and documents the principles, results, and learnings behind the research initiative FemTech.dk, which was created in 2016 and continues today as an important part of the Department of Computer Science at the University of Copenhagen’s strategic development for years to come. FemTech.dk was created in 2016 to engage with research within gender and diversity and to explore the role of gender equity as part of digital technology design and development. FemTech.dk considers how and why computer science as a field and profession in Denmark has such a distinct unbalanced gender representation in the 21st century. This book is also the story of how we (the authors) as computer science researchers embarked on a journey to engage with a new research field – equity and gender in computing – about which we had only sporadic knowledge when we began. We refer here to equity and gender in computing as a research field – but in reality, this research field is a multiplicity of entangled paths, concepts, and directions that forms important and critical insights about society, gender, politics, and infrastructures which are published in different venues and often have very different sets of criteria, values, and assumptions. Thus, part of our journey is also to learn and engage with all these different streams of research, concepts, and theoretical approaches and, through these engagements, to identify and develop our own theoretical platform, which has a foundation in our research backgrounds in Human–Computer Interaction broadly – and Interaction Design & Computer Supported Cooperative Work specifically

    Diversity in Computer Science

    Get PDF
    This is an open access book that covers the complete set of experiences and results of the FemTech.dk research which we have had conducted between 2016-2021 – from initiate idea to societal communication. Diversity in Computer Science: Design Artefacts for Equity and Inclusion presents and documents the principles, results, and learnings behind the research initiative FemTech.dk, which was created in 2016 and continues today as an important part of the Department of Computer Science at the University of Copenhagen’s strategic development for years to come. FemTech.dk was created in 2016 to engage with research within gender and diversity and to explore the role of gender equity as part of digital technology design and development. FemTech.dk considers how and why computer science as a field and profession in Denmark has such a distinct unbalanced gender representation in the 21st century. This book is also the story of how we (the authors) as computer science researchers embarked on a journey to engage with a new research field – equity and gender in computing – about which we had only sporadic knowledge when we began. We refer here to equity and gender in computing as a research field – but in reality, this research field is a multiplicity of entangled paths, concepts, and directions that forms important and critical insights about society, gender, politics, and infrastructures which are published in different venues and often have very different sets of criteria, values, and assumptions. Thus, part of our journey is also to learn and engage with all these different streams of research, concepts, and theoretical approaches and, through these engagements, to identify and develop our own theoretical platform, which has a foundation in our research backgrounds in Human–Computer Interaction broadly – and Interaction Design & Computer Supported Cooperative Work specifically

    An embedded sensor node microcontroller with crypto-processors

    Get PDF
    Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed

    A Review of Methodological Approaches for the Design and Optimization of Wind Farms

    Get PDF
    This article presents a review of the state of the art of the Wind Farm Design and Optimization (WFDO) problem. The WFDO problem refers to a set of advanced planning actions needed to extremize the performance of wind farms, which may be composed of a few individual Wind Turbines (WTs) up to thousands of WTs. The WFDO problem has been investigated in different scenarios, with substantial differences in main objectives, modelling assumptions, constraints, and numerical solution methods. The aim of this paper is: (1) to present an exhaustive survey of the literature covering the full span of the subject, an analysis of the state-of-the-art models describing the performance of wind farms as well as its extensions, and the numerical approaches used to solve the problem; (2) to provide an overview of the available knowledge and recent progress in the application of such strategies to real onshore and offshore wind farms; and (3) to propose a comprehensive agenda for future research

    Self-Evaluation Applied Mathematics 2003-2008 University of Twente

    Get PDF
    This report contains the self-study for the research assessment of the Department of Applied Mathematics (AM) of the Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) at the University of Twente (UT). The report provides the information for the Research Assessment Committee for Applied Mathematics, dealing with mathematical sciences at the three universities of technology in the Netherlands. It describes the state of affairs pertaining to the period 1 January 2003 to 31 December 2008
    • …
    corecore