DTU Orbit RSS Feed
http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08)/publications.rss
RSS FeedCUDArray: CUDA-based NumPy
http://orbit.dtu.dk/en/publications/cudarray-cudabased-numpy(1e806793-a31e-4a87-bc14-7d389f0a2d57).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/cudarray-cudabased-numpy(1e806793-a31e-4a87-bc14-7d389f0a2d57).html"><span>CUDArray: CUDA-based NumPy</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/anders-boesen-lindbo-larsen(e16ce50c-66b8-488b-b2bd-36c64f111f76).html"><span>Larsen, A. B. L.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">5 p.</span> (DTU Compute-Technical Report-2014; No. 21).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Report – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">This technical report introduces CUDArray – a CUDA-accelerated subset of the NumPy library. The goal of CUDArray is to combine the ease of development from NumPy with the computational power of Nvidia GPUs in a lightweight and extensible framework. Since the motivation behind CUDArray is to facilitate neural network programming, CUDArray extends NumPy with a neural network submodule. This module has both a CPU and a GPU back-end to allow for experiments without requiring a GPU.</div><div class="scientificreport"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>5</td></tr><tr class="status"><th>State</th><td>Published</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute-Technical Report-2014</td></tr><tr><th>Number</th><td>21</td></tr><tr><th>ISSN (print)</th><td>1601-2321</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/cudarray-cudabased-numpy(1e806793-a31e-4a87-bc14-7d389f0a2d57).html2013-12-31T23:00:00ZAn algebraic approach to graph codes
http://orbit.dtu.dk/en/publications/an-algebraic-approach-to-graph-codes(bb4e0715-71b9-406f-bf7e-84ccf1441b87).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/an-algebraic-approach-to-graph-codes(bb4e0715-71b9-406f-bf7e-84ccf1441b87).html"><span>An algebraic approach to graph codes</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/fernando-pinero(3f66e5f4-861e-4384-89ad-fddfc12127a2).html"><span>Pinero, F.</span></a> & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/peter-beelen(da3e5b30-4aed-4f4f-9e17-3fda35fb6788).html"><span>Beelen, P.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">94 p.</span> (DTU Compute PHD-2014; No. 352).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four are optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry of the Grassmannian. We expect that the techniques exposed in chapter six are also applicable to other codes as well.</div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>94</td></tr><tr class="status"><th>State</th><td>Submitted</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute PHD-2014</td></tr><tr><th>Number</th><td>352</td></tr><tr><th>ISSN (print)</th><td>0909-3192</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/an-algebraic-approach-to-graph-codes(bb4e0715-71b9-406f-bf7e-84ccf1441b87).html2013-12-31T23:00:00ZOn the use of functional calculus for phase-type and related distributions
http://orbit.dtu.dk/en/publications/on-the-use-of-functional-calculus-for-phasetype-and-related-distributions(6a1a9683-151c-46f9-9f89-d5ca1ac9ca47).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/on-the-use-of-functional-calculus-for-phasetype-and-related-distributions(6a1a9683-151c-46f9-9f89-d5ca1ac9ca47).html"><span>On the use of functional calculus for phase-type and related distributions</span></a></h2>Bladt, M., Campillo Navarro, A. & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/bo-friis-nielsen(364b98b5-e608-4186-a566-62fa91a37d59).html"><span>Nielsen, B. F.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">25 p.</span> (DTU Compute-Technical Report-2014; No. 18).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Report – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">The area of phase-type distributions is renowned for its ability to obtain closed form formulas or algorithmically exact solutions to many complex stochastic models. The method of functional calculus will provide an additional tool along these lines for establishing results in terms of functions of matrices. Functional calculus, which is a branch of operator theory frequently associated with complex analysis, can be applied to phase-type and matrix-exponential distributions in a rather straightforward way. In this paper we provide a number of examples on how to execute the formal arguments.<br /></div><div class="scientificreport"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>25</td></tr><tr class="status"><th>State</th><td>Published</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute-Technical Report-2014</td></tr><tr><th>Number</th><td>18</td></tr><tr><th>ISSN (print)</th><td>1601-2321</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/on-the-use-of-functional-calculus-for-phasetype-and-related-distributions(6a1a9683-151c-46f9-9f89-d5ca1ac9ca47).html2013-12-31T23:00:00ZCombined Shape and Topology Optimization
http://orbit.dtu.dk/en/publications/combined-shape-and-topology-optimization(7b49dbcb-17e4-425c-8ca8-a1553f95b884).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/combined-shape-and-topology-optimization(7b49dbcb-17e4-425c-8ca8-a1553f95b884).html"><span>Combined Shape and Topology Optimization</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/asger-nyman-christiansen(d2eae353-75aa-49dd-b0dd-6e91b18610e9).html"><span>Christiansen, A. N.</span></a>, <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/jakob-andreas-baerentzen(f0d1a57d-f173-4c59-87ad-b554b3678a8c).html"><span>Bærentzen, J. A.</span></a> & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/ole-sigmund(cefe1d93-608f-4ebc-823e-e776210cc1e1).html"><span>Sigmund, O.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">131 p.</span> (DTU Compute PHD-2014; No. 350).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">Shape and topology optimization seeks to compute the optimal shape and topology of a structure such that one or more properties, for example stiffness, balance or volume, are improved. The goal of the thesis is to develop a method for shape and topology optimization which uses the Deformable Simplicial Complex (DSC) method. Consequently, we present a novel method which combines current shape and topology optimization methods. This method represents the surface of the structure explicitly and discretizes the structure into non-overlapping elements, i.e. a simplicial complex. An explicit surface representation usually limits the optimization to minor shape changes. However, the DSC method uses a single explicit representation and still allows for large shape and topology changes. It does so by constantly applying a set of mesh operations during deformations of the structure. Using an explicit instead of an implicit representation gives rise to several advantages including straightforward modeling of the surface, improved scalability and ability to optimize multiple materials. <br /><br />This dissertation describes the essential parts of the novel method for combined shape and topology optimization. This includes the structural analysis in Chapter 2, the optimization in Chapter 3 and the Deformable Simplicial Complex method in Chapter 4. Finally, four applications of the developed method are presented in the included papers and summarized in Chapter 5.</div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>131</td></tr><tr class="status"><th>State</th><td>Submitted</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute PHD-2014</td></tr><tr><th>Number</th><td>350</td></tr><tr><th>ISSN (print)</th><td>0909-3192</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/combined-shape-and-topology-optimization(7b49dbcb-17e4-425c-8ca8-a1553f95b884).html2013-12-31T23:00:00ZTowards Theory-of-Mind agents using Automated Planning and Dynamic Epistemic Logic
http://orbit.dtu.dk/en/publications/towards-theoryofmind-agents-using-automated-planning-and-dynamic-epistemic-logic(d676ba55-6834-4ccc-8ab7-8b9f39a895df).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/towards-theoryofmind-agents-using-automated-planning-and-dynamic-epistemic-logic(d676ba55-6834-4ccc-8ab7-8b9f39a895df).html"><span>Towards Theory-of-Mind agents using Automated Planning and Dynamic Epistemic Logic</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/mikkel-birkegaard-andersen(5264cada-012e-4a54-b77e-cd80df5bdd05).html"><span>Andersen, M. B.</span></a> & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/thomas-bolander(c99c0e8e-86ba-44df-98df-7c5c926d803b).html"><span>Bolander, T.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">193 p.</span> (DTU Compute PHD-2014; No. 351).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">This thesis is part of a growing body of work in what we call epistemic planning. Epistemic planning is situated at the intersection of automated planning and what can broadly be called dynamic logics. Both are part of the much larger field of Artificial Intelligence.<br /><br />Automated Planning has been around since at least the 1970s. It is a diverse collection of methods, models, algorithms and specification languages for giving autonomous agents the ability to come up with plans for proactively achieving goals. Autonomous agents can be understood as independent actors, given a purpose by their designer. Whether they are in a software system, connected to the real world with sensors and actuators, or used as a tool for modelling people, for instance in economics, they need to be able to imagine (or predict) outcomes of actions in order to form plans.<br /><br />The feature that most distinguishes planning from other decision making methods, is that the planner does not know the full system from the beginning. Most of the time it would simply be too big to store in memory! Instead of being given the entire “game”, they use a specification of actions and the initial state to generate only a fraction of the full search space. This means that what an agent can plan for depends crucially on what domains we can describe. This is where logic comes into the picture.<br /><br />For most of its more than 2500 year long history, logic has been mostly interested in the study of valid reasoning. In later years (in the scheme of things), more attention has been given to studying when reasoning fails in humans. Like using differential equations to analyse and simulate both when a bridge holds and when it collapses, we can use logic to analyse and simulate reasoning both when it is sound and when it isn’t.<br /><br />The subbranch of logic applied in this work is Dynamic Epistemic Logic. The epistemic part concerns the formalisation of knowledge and belief (mainly) in multi-agent settings. We can describe situations in which many agents are present and have different knowledge and beliefs about the world and each others’ knowledge and belief. Adding the dynamic part of Dynamic Epistemic Logic to our arsenal, we can describe how situations change when, broadly speaking, things happen. In the application to Automated Planning, we let these things be actions of the agents in the system. In doing so we derive new planning formalisms that allow agents to plan under consideration of how what they do changes both the world and knowledge and belief about the world.<br /><br />In this thesis we give new planning formalisms for single-agent planning and new results for the model theory of multi-agent models. The first of the two fully developed planning formalisms is conditional (single-agent) epistemic planning, allowing an agent to plan with what it knows now and what it knows it will come to know. Though this is nothing new in Automated Planning, it sets the stage for later work.<br /><br />The second planning formalism extends conditional epistemic planning with beliefs, letting the agent have expectations, without probabilities, of how things will turn out. Our radically different notions of bisimulation for the multi-agent versions of these models are particularly interesting for logicians, as are surprising expressivity results for well known logics on such models. <br /><br />The final part of the thesis describes ideas on extending the second formalism to a multi-agent setting. With a view towards the practical implementation of agents, we shall also see how an agent can discard the parts of its model that it does not believe to be the case. While this is not necessary for analysing reasoning agents, it does seem a requirement for practical implementations. There are simply too many possibilities for a resource-bounded agent to keep track of. If the agent does discard unlikely possibilities, it must be able to do belief revision if it later turns out to be wrong. Such a procedure is also described.<br /><br />The long term potential of multi-agent aware planning algorithms is that agents that can predict and understand others in order to plan cooperation, communication, and/or competition. It is the slow edging towards a general framework for multi-agent planning that is the underlying motivation, and some of the main results, of this thesis. While regrettably we haven’t gotten there yet, we’re considerably closer than when we started.<br /></div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>193</td></tr><tr class="status"><th>State</th><td>Submitted</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute PHD-2014</td></tr><tr><th>Number</th><td>351</td></tr><tr><th>ISSN (print)</th><td>0909-3192</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/towards-theoryofmind-agents-using-automated-planning-and-dynamic-epistemic-logic(d676ba55-6834-4ccc-8ab7-8b9f39a895df).html2013-12-31T23:00:00ZOn the Impact of Energy Harvesting on Wireless Sensor Network Security
http://orbit.dtu.dk/en/publications/on-the-impact-of-energy-harvesting-on-wireless-sensor-network-security(55504a70-d478-4d56-8ef6-ce0a893cef00).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/on-the-impact-of-energy-harvesting-on-wireless-sensor-network-security(55504a70-d478-4d56-8ef6-ce0a893cef00).html"><span>On the Impact of Energy Harvesting on Wireless Sensor Network Security</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/alessio-di-mauro(871ecd8a-a186-438b-85d3-81867b027395).html"><span>Di Mauro, A.</span></a> & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/nicola-dragoni(d3e23247-b383-48bc-a5c1-f5de69fc9834).html"><span>Dragoni, N.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">144 p.</span> (DTU Compute PHD-2014; No. 349).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">Given the continuous advancements in the technology of energy harvesting over the last few years, we are now starting to see wireless sensor networks (WSNs) powered by scavenged energy. This change in paradigm has major repercussions not only on the hardware engineering aspects, but also on the software side. The first protocols specifically designed to take advantage of the energy harvesting capabilities of a network have just recently appeared. At the same time, security remains one of the central points of WSNs development, because of their intrinsically<br />unreliable nature that combines a readily accessible communication infrastructure such as wireless data exchange, to an often likewise readily accessible physical deployment. This dissertation provides a comprehensive look at how security can be improved by what energy harvesting has to offer. The main question asked is whether or not it is possible to provide better security in a WSN, by being aware of the fact that the amount of available energy is not going to monotonically decrease over time. The work covers different aspects and components of a WSN and focuses on what is arguably one the most important ones, medium access control (MAC) protocols. An energy-harvesting specific MAC protocol is introduced together with a related security suite. A new attack relevant to a whole class of MAC protocols is also introduced, along with a scheme that defeats it. A security approach for MAC protocols is discussed to provide an energy-aware solution. In order to address security bootstrapping, a new energy-adaptive key reinforcement scheme is presented. Finally an implementation and some experimental results are provided.<br /></div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>144</td></tr><tr class="status"><th>State</th><td>Submitted</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute PHD-2014</td></tr><tr><th>Number</th><td>349</td></tr><tr><th>ISSN (print)</th><td>0909-3192</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/on-the-impact-of-energy-harvesting-on-wireless-sensor-network-security(55504a70-d478-4d56-8ef6-ce0a893cef00).html2013-12-31T23:00:00ZTopics in combinatorial pattern matching
http://orbit.dtu.dk/en/publications/topics-in-combinatorial-pattern-matching(645fcd6e-ba1d-48b8-bc3d-04f90e14dce0).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/topics-in-combinatorial-pattern-matching(645fcd6e-ba1d-48b8-bc3d-04f90e14dce0).html"><span>Topics in combinatorial pattern matching</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/hjalte-wedel-vildhoej(7bac41cb-80f9-4c7e-9053-b5c740a9537a).html"><span>Vildhøj, H. W.</span></a>, <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/inge-li-goertz(08da98e0-b1f4-492e-94e7-15083cc40701).html"><span>Gørtz, I. L.</span></a> & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/philip-bille(81ad6edf-aa11-47bc-adaf-227fe7e6963e).html"><span>Bille, P.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">111 p.</span> (DTU Compute PHD-2014; No. 348).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">This dissertation studies problems in the general theme of combinatorial pattern matching. More specifically, we study the following topics:<br /><br />Longest Common Extensions. We revisit the longest common extension (LCE) problem, that is, preprocess a string T into a compact data structure that supports fast LCE queries. An LCE query takes a pair (i, j) of indices in T and returns the length of the longest common prefix of the suffixes of T starting at positions i and j. Such queries are also commonly known as longest common prefix (LCP) queries. We study the time-space trade-offs for the problem, that is, the space used for the data structure vs. the worst-case time for answering an LCE query. Let n be the length of T. Given a parameter τ , 1 ≤ τ ≤ n, we show how to achieve either O(n/√τ ) space and O(τ) query time, or O(n/τ) space and O(τ log (|LCE(i, j)|/τ)) query time, where ?LCE(i, j)| denotes the length of the LCE returned by the query. These bounds provide the first smooth trade-offs for the LCE problem and almost match the previously known bounds at the extremes when τ = 1 or τ = n. We apply the result to obtain improved bounds for several applications where the LCE problem is the computational bottleneck, including approximate string matching and computing palindromes. We also present an efficient technique to reduce LCE queries on two strings to one string. Finally, we give a lower bound on the time-space product for LCE data structures in the non-uniform cell probe model showing that our second trade-off is nearly optimal.<br /><br />Fingerprints in Compressed Strings. The Karp-Rabin fingerprint of a string is a type of hash value that due to its strong properties has been used in many string algorithms. We show how to construct a data structure for a string S of size N compressed by a context-free grammar of size n that supports fingerprint queries. That is, given indices i and j, the answer to a query is the fingerprint of the substring S[i, j]. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get O(log N) query time, and<br />for Linear SLPs (an SLP derivative that captures LZ78 compression and its variations) we get O (log log N) query time. Hence, our data structures has the same time and space complexity as for random access in SLPs. We utilize the fingerprint data structures to solve the longest common extension problem in query time O(log N log e) and O(log e log log e+log log N) for SLPs and Linear SLPs, respectively. Here, e = |LCE(i, j)| denotes the length of the LCE.<br /><br />Sparse Text Indexing. We present efficient algorithms for constructing sparse suffix trees, sparse suffix arrays and sparse positions heaps for b arbitrary positions of a text T of length n while using only O(b) words of space during the construction. Our main contribution is to show that the sparse suffix tree (and array) can be constructed in O(n log² b) time. To achieve this we develop a technique, that allows to efficiently answer b longest common prefix queries on suffixes of T, using only O(b) space. Our first solution is Monte-Carlo and outputs the correct tree with high probability. We then give a Las-Vegas algorithm which also uses O(b) space and runs in the same time bounds with high probability when b = O(√n). Furthermore, additional tradeoffs between the space usage and the construction time for the Monte-Carlo algorithm are given. Finally, we show that at the expense of slower pattern queries, it is possible to construct sparse position heaps in O(n + b log b) time and O(b) space.<br /><br />The Longest Common Substring Problem. Given m documents of total length n, we consider the problem of finding a longest string common to at least d ≥ 2 of the documents. This problem is known as the longest common substring (LCS) problem and has a classic O(n) space and O(n) time solution (Weiner [FOCS’73], Hui [CPM’92]). However, the use of linear space is impractical in many applications. We show several time-space trade-offs for this problem. Our main result is that for any trade-off parameter 1 ≤ τ ≤ n, the LCS problem can be solved in O(τ) space and O(n²/τ) time, thus providing the first smooth deterministic time-space trade-off from constant to linear space. The result uses a new and very simple algorithm, which computes a τ-additive approximation to the LCS<br />in O(n²/τ) time and O(1) space. We also show a time-space trade-off lower bound for deterministic branching programs, which implies that any deterministic RAM algorithm solving the LCS problem on documents from a sufficiently large alphabet in O(τ) space must use Ω (n√log(n/(τ log n))/ log log(n/(τ log n)) time.<br /><br />Structural Properties of Suffix Trees. We study structural and combinatorial properties of suffix trees. Given an unlabeled tree T on n nodes and suffix links of its internal nodes, we ask the question “Is T a suffix tree?”, i.e., is there a string S whose suffix tree has the same topological structure as T ? We place no restrictions on S, in particular we do not require that S ends with a unique symbol. This corresponds to considering the more general definition of implicit or extended suffix trees. Such general suffix trees have many applications and are for example needed to allow efficient updates when suffix trees are built online. We prove that T is a suffix tree if and only if it is realized by a string S of length n – 1, and we give a linear-time algorithm for inferring S when the first letter on each edge is known.</div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>111</td></tr><tr class="status"><th>State</th><td>Submitted</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute PHD-2014</td></tr><tr><th>Number</th><td>348</td></tr><tr><th>ISSN (print)</th><td>0909-3192</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/topics-in-combinatorial-pattern-matching(645fcd6e-ba1d-48b8-bc3d-04f90e14dce0).html2013-12-31T23:00:00ZA Probabilistic Approach for the System-Level Design of Multi-ASIP Platforms
http://orbit.dtu.dk/en/publications/a-probabilistic-approach-for-the-systemlevel-design-of-multiasip-platforms(60b4a2db-15f6-42d6-9e06-88af5edc0d5f).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/a-probabilistic-approach-for-the-systemlevel-design-of-multiasip-platforms(60b4a2db-15f6-42d6-9e06-88af5edc0d5f).html"><span>A Probabilistic Approach for the System-Level Design of Multi-ASIP Platforms</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/laura-micconi(56a260fb-3d5f-425f-a2bf-e1ff437ac861).html"><span>Micconi, L.</span></a>, <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/jan-madsen(5f89e4ed-9ff8-43d2-add5-a5182f0e1268).html"><span>Madsen, J.</span></a> & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/paul-pop(9ae8b873-7735-48b5-8b97-9fedf1891f0f).html"><span>Pop, P.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">176 p.</span> (DTU Compute PHD-2014; No. 347).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">Application Specific Instruction-set Processors (ASIPs) offer a good trade off between performance and flexibility when compared to general purpose processors or ASICs. Additionally, multiple ASIPs can be included in a single platform and they allow the generation of customized heterogeneous MPSoC with a relatively short time-to-market. While there are several commercial tools for the design of a single ASIP, there is still a lack of automation in the design of multi-ASIP platforms. <br /><br />In this thesis we consider multi-ASIP platforms for real-time applications. Each ASIP is designed to run a specific group of tasks that we identifies as a task cluster. With realtime applications, to decide how the tasks should be clustered, we perform a schedulability analysis of the system to verify if the deadlines of the applications can be met. However, to run a schedulability analysis, we need to know the WCET of each task that is available only after an ASIP is designed. Therefore, there is a circular dependency between the definition of the task clusters and the impossibility of defining them without knowing the WCET of the tasks as the ASIPs have not been defined yet. <br /><br />Many approaches available in the literature break this circular dependency considering pre-defined task clusters or considering a small set of micro-architecture configurations for each ASIP. We propose an alternative approach that uses a probabilistic model to consider the design space of all possible micro-architecture configurations. We introduce a system-level Design Space Exploration (DSE) for the very early phases of the design that automatizes part of the multi-ASIP design flow. Our DSE is responsible for assigning the tasks to the different ASIPs exploring different platform alternatives. We perform a schedulability analysis for each solution to determine which one has the highest chances of meeting the deadlines of the applications and that should be considered in the next stages of the multi-ASIP design flow.</div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>176</td></tr><tr class="status"><th>State</th><td>Submitted</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute PHD-2014</td></tr><tr><th>Number</th><td>347</td></tr><tr><th>ISSN (print)</th><td>0909-3192</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/a-probabilistic-approach-for-the-systemlevel-design-of-multiasip-platforms(60b4a2db-15f6-42d6-9e06-88af5edc0d5f).html2013-12-31T23:00:00ZCoarse Analysis of Microscopic Models using Equation-Free Methods
http://orbit.dtu.dk/en/publications/coarse-analysis-of-microscopic-models-using-equationfree-methods(80878a88-8e11-48c5-87fd-4a33e5aaaaed).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/coarse-analysis-of-microscopic-models-using-equationfree-methods(80878a88-8e11-48c5-87fd-4a33e5aaaaed).html"><span>Coarse Analysis of Microscopic Models using Equation-Free Methods</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/christian-marschler(abdb1658-7c82-455a-983b-7366ad8afce4).html"><span>Marschler, C.</span></a> & <a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/jens-starke(769799c6-1a6a-4f3b-9ad2-c0318450485f).html"><span>Starke, J.</span></a> <span class="date">2014</span> Kgs. Lyngby: <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">189 p.</span> (DTU Compute PHD-2014; No. 342).<p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">Mathematical models of real-world problems from physics, biology and chemistry have become very complex over the last three decades. Although increasing computational power allows to solve even larger systems of differential equations, the number of differential equations is still a main limiting factor for the complexity of models, e.g., in real-time applications. With the increasing amount of data generated by computer simulations a challenge is to extract valuable information from the models in order to help scientists and managers in a decision-making process. Although the dynamics of these models might be high-dimensional, the properties of interest are usually macroscopic and lowdimensional in nature. Examples are numerous and not necessarily restricted to computer models. For instance, the power output, energy consumption and temperature of engines are interesting quantities for engineers, although the models they base their design on are described for the gas mixture (a system with many degrees-of-freedom) inside a combustion engine. Since good models are often not available on the macroscopic scale the necessary information has to be extracted from the microscopic, high-dimensional models. <br /> <br />The goal of this thesis is to investigate such high-dimensional multiscale models and extract relevant low-dimensional information from them. Recently developed mathematical tools allow to reach this goal: a combination of so-called equation-free methods with numerical bifurcation analysis is used and further developed to gain insight into high-dimensional systems on a macroscopic level of interest. Based on a switching-procedure between a detailed microscopic and a coarse macroscopic level during simulations it is possible to obtain a closure-ondemand for the macroscopic dynamics by only using short simulation bursts of computationally-expensive complex models. Those information is subsequently used to construct bifurcation diagrams that show the parameter dependence of solutions of the system.<br /><br />The methods developed for this thesis have been applied to a wide range of relevant problems. Applications include the learning behavior in the barn owl’s auditory system, traffic jam formation in an optimal velocity model for circular car traffic and oscillating behavior of pedestrian groups in a counter-flow through a corridor with narrow door. The methods do not only quantify interesting properties in these models (learning outcome, traffic jam density, oscillation period), but also allow to investigate unstable solutions, which are important information to determine basins of attraction of stable solutions and thereby reveal information on the long-term behavior of an initial state.</div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Place of publication</th><td>Kgs. Lyngby</td></tr><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>189</td></tr><tr class="status"><th>State</th><td>Published</td></tr></tbody></table></div> <table class="properties"><tbody><tr><th>Name</th><td>DTU Compute PHD-2014</td></tr><tr><th>Number</th><td>342</td></tr><tr><th>ISSN (print)</th><td>0909-3192</td></tr></tbody></table></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/coarse-analysis-of-microscopic-models-using-equationfree-methods(80878a88-8e11-48c5-87fd-4a33e5aaaaed).html2013-12-31T23:00:00ZDelivery of Biologics Across the Blood-Brain Barrier Through Nanoencapsulation
http://orbit.dtu.dk/en/publications/delivery-of-biologics-across-the-bloodbrain-barrier-through-nanoencapsulation(65adbf1a-a8d4-4b68-9b0f-0cc2b8973bcc).html
<div style='font-size: 9px;'><div class="rendering rendering_publication rendering_publication_short rendering_bookanthology rendering_short rendering_bookanthology_short"><h2 class="title"><a class="link" rel="BookAnthology" href="http://orbit.dtu.dk/en/publications/delivery-of-biologics-across-the-bloodbrain-barrier-through-nanoencapsulation(65adbf1a-a8d4-4b68-9b0f-0cc2b8973bcc).html"><span>Delivery of Biologics Across the Blood-Brain Barrier Through Nanoencapsulation</span></a></h2><a class="link person" rel="Person" href="http://orbit.dtu.dk/en/persons/jonas-bruun(4b450ece-f912-461c-8292-a2a485fc6044).html"><span>Bruun, J.</span></a>, Andresen, T. L., Holm, R. & Gjetting, T. <span class="date">2014</span> <a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a>. <span class="numberofpages">145 p.</span><p class="type"><span class="type_family">Publication<span class="type_family_sep">: </span></span><span class="type_classification_parent">Research<span class="type_parent_sep"> › </span></span><span class="type_classification">Ph.D. thesis – Annual report year: 2014</span></p></div><div class="rendering rendering_publication rendering_publication_detailsportal rendering_bookanthology rendering_detailsportal rendering_bookanthology_detailsportal"><div class="textblock">Drug delivery through nanoencapsulation is a promising approach that offers systemic protection of the pharmaceutical and targeted delivery to the diseased tissue. Especially cancer therapeutic and gene-based medicine may benefit from the advantages offered by encapsulation in nanocarriers, since the off-target effect of anti-cancer drug often is severe and gene-based medicine have low systemic stability on its own.<br />This thesis presents four different nanocarrier system with specific focus on delivery of small interfering RNA (siRNA) and cancer therapeutics. The first nanocarrier presented is a polymeric micelle made from an anionic triblock copolymer and was intended for delivery of drugs to the central nervous system (CNS), which is protected by the largely impermeable blood-brain barrier (BBB). In order to target the nanocarrier to the brain endothelial cells and obtain receptor-mediated trancytosis across the BBB, it was functionalized with the ligand angiopep. The functionalized micelles demonstrated high uptake in vitro but had no preference for the BBB when systemic administrated to mice.<br />The middle block of the polymer was in the next study changed into two polycations of different charge density, which allowed for complexation of siRNA. These polyplexes were analysed for their ability to facilitate down-regulation of specific proteins in the targeted cells and the study showed that the more dens structure had better condensation of siRNA and mediated a more efficient inhibition of the reporter protein.<br />One of the great challenges for drug delivery by nanocarriers is the dilemma of designing a particle that is highly stable whit no cellular interaction while in the blood stream but has a high uptake and efficient drug release in the diseased cells. As a solution to this dilemma, a liposomal nanocarrier containing an enzymatic cleavable lipopeptide was designed. The lipopeptide linked the protective poly(ethylene glycol) (PEG) to the liposome and when enzymatic cleaved it activated the liposome by removing the repulsive PEG coating. The dePEGylated liposome had increased cellular uptake and endosomal escape, which was utilized for highly effective delivery of siRNA to tumour cells. The enzyme sensitive liposomes were also applied for targeted delivery of<br />chemotherapeutic agent. By a combination of targeting ligands and the cleavable<br />lipopeptide the liposome was able to facilitate high delivery of the compound and<br />efficient intracellular release and consequently killing the cancer cells.</div><div class="phddissertation"><table class="properties"><tbody><tr class="language"><th>Original language</th><td>English</td></tr><tr><th>Publication date</th><td><span class="date">2014</span></td></tr></tbody></table><table class="properties"><tbody><tr><th>Publisher</th><td><a class="link" rel="Publisher" href="http://orbit.dtu.dk/en/publishers/technical-university-of-denmark-dtu(f7c040ab-194a-4da4-b458-670da24b2a08).html"><span>Technical University of Denmark (DTU)</span></a></td></tr><tr><th>Number of pages</th><td>145</td></tr><tr class="status"><th>State</th><td>Published</td></tr></tbody></table></div></div></div>Tue, 31 Dec 2013 23:00:00 GMThttp://orbit.dtu.dk/en/publications/delivery-of-biologics-across-the-bloodbrain-barrier-through-nanoencapsulation(65adbf1a-a8d4-4b68-9b0f-0cc2b8973bcc).html2013-12-31T23:00:00Z