Open Access. Powered by Scholars. Published by Universities.®
Programming Languages and Compilers Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Software Engineering (55)
- Engineering (41)
- Computer Engineering (32)
- Theory and Algorithms (32)
- Graphics and Human Computer Interfaces (24)
-
- Numerical Analysis and Scientific Computing (23)
- Artificial Intelligence and Robotics (19)
- Information Security (19)
- Other Computer Sciences (19)
- Systems Architecture (19)
- Computer and Systems Architecture (17)
- Databases and Information Systems (15)
- OS and Networks (15)
- Social and Behavioral Sciences (13)
- Statistics and Probability (13)
- Education (10)
- Life Sciences (9)
- Data Science (8)
- Mathematics (8)
- Arts and Humanities (6)
- Digital Communications and Networking (6)
- Physics (6)
- Applied Mathematics (5)
- Computational Engineering (5)
- Medicine and Health Sciences (5)
- Science and Mathematics Education (5)
- Applied Statistics (4)
- Institution
-
- San Jose State University (22)
- University of Arkansas, Fayetteville (20)
- California Polytechnic State University, San Luis Obispo (18)
- Singapore Management University (15)
- Old Dominion University (12)
-
- American University in Cairo (10)
- Air Force Institute of Technology (9)
- University of Massachusetts Amherst (9)
- University of Tennessee, Knoxville (9)
- California State University, San Bernardino (8)
- Portland State University (8)
- Western University (8)
- City University of New York (CUNY) (6)
- The University of Akron (6)
- University of Nevada, Las Vegas (6)
- Nova Southeastern University (5)
- Ouachita Baptist University (5)
- University of North Florida (5)
- Edith Cowan University (4)
- Bard College (3)
- La Salle University (3)
- University of Kentucky (3)
- Western Michigan University (3)
- Boise State University (2)
- Georgia Southern University (2)
- James Madison University (2)
- Louisiana State University (2)
- Michigan Technological University (2)
- Munster Technological University (2)
- University of Nebraska at Omaha (2)
- Keyword
-
- Python (7)
- Compiler (6)
- Compilers (6)
- Computer Science (6)
- Performance (6)
-
- Security (6)
- Java (5)
- Static analysis (5)
- CUDA (4)
- Functional programming (Computer science) (4)
- Programming Languages (4)
- Programming languages (Electronic computers) (4)
- Arduino (3)
- Computer simulation (3)
- Debugging (3)
- Deep learning (3)
- Functional programming languages (3)
- Image processing (3)
- Internet (3)
- Machine Learning (3)
- Natural Language Processing (3)
- Parallelism (3)
- Programming (3)
- Programming language (3)
- Source code (3)
- Academic – UNF – Computing (2)
- Academic – UNF – Master of Science in Computer and Information Sciences; Dissertations (2)
- Ada (Computer program language) (2)
- Algorithms (2)
- Analysis (2)
- Publication Year
- Publication
-
- Master's Projects (22)
- Master's Theses (15)
- Doctoral Dissertations (14)
- Theses and Dissertations (14)
- Computer Science and Computer Engineering Undergraduate Honors Theses (10)
-
- Graduate Theses and Dissertations (10)
- Archived Theses and Dissertations (9)
- Dissertations and Theses (9)
- Dissertations and Theses Collection (Open Access) (9)
- Computer Science Theses & Dissertations (8)
- Electronic Thesis and Dissertation Repository (8)
- Honors Theses (8)
- Dissertations and Theses Collection (6)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (6)
- Williams Honors College, Honors Research Projects (6)
- Electronic Theses and Dissertations (5)
- Electronic Theses, Projects, and Dissertations (5)
- UNF Graduate Theses and Dissertations (5)
- CCE Theses and Dissertations (4)
- Masters Theses (4)
- Theses : Honours (4)
- Computer Engineering (3)
- Dissertations (3)
- Mathematics and Computer Science Capstones (3)
- Theses Digitization Project (3)
- Boise State University Theses and Dissertations (2)
- Chancellor’s Honors Program Projects (2)
- Computational Modeling & Simulation Engineering Theses & Dissertations (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Dissertations, Theses, and Capstone Projects (2)
Articles 1 - 30 of 251
Full-Text Articles in Programming Languages and Compilers
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman
Dissertations, Theses, and Capstone Projects
The word “billion” is a mathematical abstraction related to “big,” but it is difficult to understand the vast difference in value between one million and one billion; even harder to understand the vast difference in purchasing power between one billion dollars, and the average U.S. yearly income. Perhaps most difficult to conceive of is what that purchasing power and huge mass of capital translates to in terms of power. This project blends design, text, facts, and figures into an interactive narrative website that helps the user better understand their position in relation to extreme wealth: https://whatdoesonebilliondollarslooklike.website/
The site incorporates …
Random Variable Spaces: Mathematical Properties And An Extension To Programming Computable Functions, Mohammed Kurd-Misto
Random Variable Spaces: Mathematical Properties And An Extension To Programming Computable Functions, Mohammed Kurd-Misto
Computational and Data Sciences (PhD) Dissertations
This dissertation aims to extend the boundaries of Programming Computable Functions (PCF) by introducing a novel collection of categories referred to as Random Variable Spaces. Originating as a generalization of Quasi-Borel Spaces, Random Variable Spaces are rigorously defined as categories where objects are sets paired with a collection of random variables from an underlying measurable space. These spaces offer a theoretical foundation for extending PCF to natively handle stochastic elements.
The dissertation is structured into seven chapters that provide a multi-disciplinary background, from PCF and Measure Theory to Category Theory with special attention to Monads and the Giry Monad. The …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Undergraduate Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Electronic Theses, Projects, and Dissertations
Thyroid illness frequently manifests as hypothyroidism. It is evident that people with hypothyroidism are primarily female. Because the majority of people are unaware of the illness, it is quickly becoming more serious. It is crucial to catch it early on so that medical professionals can treat it more effectively and prevent it from getting worse. Machine learning illness prediction is a challenging task. Disease prediction is aided greatly by machine learning. Once more, unique feature selection strategies have made the process of disease assumption and prediction easier. To properly monitor and cure this illness, accurate detection is essential. In order …
A Quantitative Visualization Tool For The Assessment Of Mammographic Risky Dense Tissue Types, Margaret R. Mccarthy
A Quantitative Visualization Tool For The Assessment Of Mammographic Risky Dense Tissue Types, Margaret R. Mccarthy
Electronic Theses and Dissertations
Breast cancer is the second most occurring cancer type and is ranked fifth in terms of mortality. X-ray mammography is the most common methodology of breast imaging and can show radiographic signs of cancer, such as masses and calcifcations. From these mammograms, radiologists can also assess breast density, which is a known cancer risk factor. However, since not all dense tissue is cancer-prone, we hypothesize that dense tissue can be segregated into healthy vs. risky subtypes. We propose that risky dense tissue is associated with tissue microenvironment disorganization, which can be quantified via a computational characterization of the whole breast …
Contactless Food Ordering System, Rishivar Kumar Goli
Contactless Food Ordering System, Rishivar Kumar Goli
Electronic Theses, Projects, and Dissertations
Contactless food ordering has revolutionized the way a customer interacts with restaurants by allowing them to place orders and make transactions. Through these web-based platforms, customers can now browse menus, customize orders, and make payments seamlessly. By scanning the restaurant’s QR code, customers can reserve a table. If the table is available, then automatically it will be reserved. However, if the table is occupied the customer will be added to the waiting list. Once the customer selects desired food then they can securely make payments based on ordered food items. The food will be delivered straight to the customer's table. …
Restaurant Management Website, Akhil Sai Gollapudi
Restaurant Management Website, Akhil Sai Gollapudi
Electronic Theses, Projects, and Dissertations
In the ever-evolving corporate landscape of today, it is crucial to respond to customer needs as efficiently and in a timely manner as possible. The project's primary objective is to create a method for clients to make reservations for restaurants online. This makes life easier for busy customers in their daily life.
Today, people are looking for comfort thanks to rapidly developing technology. As we can see, people invent and implement new technologies in all fields according to customer needs.
We got a unique restaurant idea that helps people save time. People prefer quick methods to get things done. With …
Web Based Management System For Housing Society, Likhitha Reddy Eddala
Web Based Management System For Housing Society, Likhitha Reddy Eddala
Electronic Theses, Projects, and Dissertations
Web Based Management System for Housing Society plays a major role in our day-to-day life. We develop a global web dependent application using AngularJS, Node JS and MySQL, with Xampp as the server to make an effective management system. This system is designed to provide a user-friendly and efficient platform for managing all the details of daily notices, monthly meetings, events, payments, maids etc., This system mainly consists of three modules, they are: Admin, User and Security. Each module here serves specific features and functionalities present within society. Admin module provides the features for managing user, houses, security, maids, notices, …
Deep Learning Recommendations For The Acl2 Interactive Theorem Prover, Robert K. Thompson, Robert K. Thompson
Deep Learning Recommendations For The Acl2 Interactive Theorem Prover, Robert K. Thompson, Robert K. Thompson
Master's Theses
Due to the difficulty of obtaining formal proofs, there is increasing interest in partially or completely automating proof search in interactive theorem provers. Despite being a theorem prover with an active community and plentiful corpus of 170,000+ theorems, no deep learning system currently exists to help automate theorem proving in ACL2. We have developed a machine learning system that generates recommendations to automatically complete proofs. We show that our system benefits from the copy mechanism introduced in the context of program repair. We make our system directly accessible from within ACL2 and use this interface to evaluate our system in …
Mapping Programs To Equations, Hessamaldin Mohammadi
Mapping Programs To Equations, Hessamaldin Mohammadi
Dissertations
Extracting the function of a program from a static analysis of its source code is a valuable capability in software engineering; at a time when there is increasing talk of using AI (Artificial Intelligence) to generate software from natural language specifications, it becomes increasingly important to determine the exact function of software as written, to figure out what AI has understood the natural language specification to mean. For all its criticality, the ability to derive the domain-to-range function of a program has proved to be an elusive goal, due primarily to the difficulty of deriving the function of iterative statements. …
Visualized Algorithm Engineering On Two Graph Partitioning Problems, Zizhen Chen
Visualized Algorithm Engineering On Two Graph Partitioning Problems, Zizhen Chen
Computer Science and Engineering Theses and Dissertations
Concepts of graph theory are frequently used by computer scientists as abstractions when modeling a problem. Partitioning a graph (or a network) into smaller parts is one of the fundamental algorithmic operations that plays a key role in classifying and clustering. Since the early 1970s, graph partitioning rapidly expanded for applications in wide areas. It applies in both engineering applications, as well as research. Current technology generates massive data (“Big Data”) from business interactions and social exchanges, so high-performance algorithms of partitioning graphs are a critical need.
This dissertation presents engineering models for two graph partitioning problems arising from completely …
Utilizing Machine Learning Techniques To Predict Credit Card Payment Defaults, Madison Guerra
Utilizing Machine Learning Techniques To Predict Credit Card Payment Defaults, Madison Guerra
Theses and Dissertations
The question of accurately predicting credit card defaulters has been explored in numerous studies in the past. In these studies, the researchers utilized various machine learning theories and techniques to make the determination the extent of defaults. Unfortunately, some constraints were encountered, and the limitations that existed from the previous works have been discussed. This project attempted to address these issues with special attention given to more recently available data. Specifically, in this project, we looked at data provided by one Kaggle user, which utilized the data from the American Express credit card competition, which ranges from late March 2018 …
Identifying And Analyzing Multi-Star Systems Among Tess Planetary Candidates Using Gaia, Katie E. Bailey
Identifying And Analyzing Multi-Star Systems Among Tess Planetary Candidates Using Gaia, Katie E. Bailey
Electronic Theses and Dissertations
Exoplanets represent a young, rapidly advancing subfield of astrophysics where much is still unknown. It is therefore important to analyze trends among their parameters to learn more about these systems. More complexity is added to these systems with the presence of additional stellar companions. To study these complex systems, one can employ programming languages such as Python to parse databases such as those constructed by TESS and Gaia to bridge the gap between exoplanets and stellar companions. Data can then be analyzed for trends in these multi-star exoplanet systems and in juxtaposition to their single-star counterparts. This research was able …
Dynamically Finding Optimal Kernel Launch Parameters For Cuda Programs, Taabish Jeshani
Dynamically Finding Optimal Kernel Launch Parameters For Cuda Programs, Taabish Jeshani
Electronic Thesis and Dissertation Repository
In this thesis, we present KLARAPTOR (Kernel LAunch parameters RAtional Program estimaTOR), a freely available tool to dynamically determine the values of kernel launch parameters of a CUDA kernel. We describe a technique for building a helper program, at the compile-time of a CUDA program, that is used at run-time to determine near-optimal kernel launch parameters for the kernels of that CUDA program. This technique leverages the MWP-CWP performance prediction model, runtime data parameters, and runtime hardware parameters to dynamically determine the launch parameters for each kernel invocation. This technique is implemented within the KLARAPTOR tool, utilizing the LLVM Pass …
Code Generation Based On Inference And Controlled Natural Language Input, Howard R. Dittmer
Code Generation Based On Inference And Controlled Natural Language Input, Howard R. Dittmer
College of Computing and Digital Media Dissertations
Over time the level of abstraction embodied in programming languages has continued to grow. Paradoxically, most programming languages still require programmers to conform to the language's rigid constructs. These constructs have been implemented in the name of efficiency for the computer. However, the continual increase in computing power allows us to consider techniques not so limited. To this end, we have created CABERNET, a Controlled Natural Language (CNL) based approach to program creation. CABERNET allows programmers to use a simple outline-based syntax. This syntax enables increased programmer efficiency.
CNLs have previously been used to document requirements. We have taken this …
A Graphical User Interface Using Spatiotemporal Interpolation To Determine Fine Particulate Matter Values In The United States, Kelly M. Entrekin
A Graphical User Interface Using Spatiotemporal Interpolation To Determine Fine Particulate Matter Values In The United States, Kelly M. Entrekin
Honors College Theses
Fine particulate matter or PM2.5 can be described as a pollution particle that has a diameter of 2.5 micrometers or smaller. These pollution particle values are measured by monitoring sites installed across the United States throughout the year. While these values are helpful, a lot of areas are not accounted for as scientists are not able to measure all of the United States. Some of these unmeasured regions could be reaching high PM2.5 values over time without being aware of it. These high values can be dangerous by causing or worsening health conditions, such as cardiovascular and lung diseases. Within …
Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada
Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada
Master's Projects
With the widespread use of web applications across the globe, and the ad- vancements in web technologies in recent years, these applications have grown more ubiquitous and sophisticated than ever before. Modern web applications face the constant threat of numerous web security risks given their presence on the internet and the massive influx of data from external sources. This paper presents a novel method for analyzing taint through type-checking and applies it to web applications in the context of preventing online security threats. The taint analysis technique is implemented in TypeScript using its built-in type-checking features, and then integrated into …
Macruby: User Defined Macro Support For Ruby, Arushi Singh
Macruby: User Defined Macro Support For Ruby, Arushi Singh
Master's Projects
Ruby does not have a way to create custom syntax outside what the language already offers. Macros allow custom syntax creation. They achieve this by code generation that transforms a small set of instructions into a larger set of instructions. This gives programmers the opportunity to extend the language based on their own custom needs.
Macros are a form of meta-programming that helps programmers in writing clean and concise code. MacRuby is a hygienic macro system. It works by parsing the Abstract Syntax Tree(AST) and replacing macro references with expanded Ruby code. MacRuby offers an intuitive way to declare macro …
Mapping The Focal Points Of Wordpress: A Software And Critical Code Analysis, Bryce Jackson
Mapping The Focal Points Of Wordpress: A Software And Critical Code Analysis, Bryce Jackson
Electronic Theses and Dissertations, 2020-
Programming languages or code can be examined through numerous analytical lenses. This project is a critical analysis of WordPress, a prevalent web content management system, applying four modes of inquiry. The project draws on theoretical perspectives and areas of study in media, software, platforms, code, language, and power structures. The applied research is based on Critical Code Studies, an interdisciplinary field of study that holds the potential as a theoretical lens and methodological toolkit to understand computational code beyond its function. The project begins with a critical code analysis of WordPress, examining its origins and source code and mapping selected …
Compiling Quantum Programs, Li-Heng Henry Chang
Compiling Quantum Programs, Li-Heng Henry Chang
Senior Projects Spring 2023
This thesis introduces the quantum compilation problem and develops a prototypical compiler. The problem of quantum compiling is, in essence, converting high-level human expressions of quantum programs into low-level hardware executable code. Compilers that target different hardware platforms enable portable code that can be used to benchmark hardware performance, reduce programming work and speed up development. Because quantum systems are subjected to phenomena such as noise, no-cloning and decoherence, the challenge of quantum compiling is tied to the optimization of program runtimes and the lengths of compiled sequences. For near-term intermediate scale quantum (NISQ) computers with limited hardware resources and …
Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran
Comparative Analysis Of Fullstack Development Technologies: Frontend, Backend And Database, Qozeem Odeniran
Electronic Theses and Dissertations
Accessing websites with various devices has brought changes in the field of application development. The choice of cross-platform, reusable frameworks is very crucial in this era. This thesis embarks in the evaluation of front-end, back-end, and database technologies to address the status quo. Study-a explores front-end development, focusing on angular.js and react.js. Using these frameworks, comparative web applications were created and evaluated locally. Important insights were obtained through benchmark tests, lighthouse metrics, and architectural evaluations. React.js proves to be a performance leader in spite of the possible influence of a virtual machine, opening the door for additional research. Study b …
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
UNF Graduate Theses and Dissertations
Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.
One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …
Methods For Drone Trajectory Analysis Of Bottlenose Dolphins (Tursiops Truncatus), Jillian D. Bliss
Methods For Drone Trajectory Analysis Of Bottlenose Dolphins (Tursiops Truncatus), Jillian D. Bliss
Theses and Dissertations
With the increase in the use of UAS (Unmanned Aerial Systems) for marine mammal research, there is a need for the development of methods of analysis to transform UAS high resolution video into quantitative data. This study sought to develop a preliminary method of analysis that would quantify and present a way to visualize the dynamics and relative spatial distribution and changes in distribution of bottlenose dolphins (Tursiops truncatus) in the waters of Turneffe Atoll, Belize. This approach employs a previously developed video tracking program ‘Keypoint Tracking’ that enables manual tracking of individual dolphins and the creation of …
Advances In The Automatic Detection Of Optimization Opportunities In Computer Programs, Delaram Talaashrafi
Advances In The Automatic Detection Of Optimization Opportunities In Computer Programs, Delaram Talaashrafi
Electronic Thesis and Dissertation Repository
Massively parallel and heterogeneous systems together with their APIs have been used for various applications. To achieve high-performance software, the programmer should develop optimized algorithms to maximize the system’s resource utilization. However, designing such algorithms is challenging and time-consuming. Therefore, optimizing compilers are developed to take part in the programmer’s optimization burden. Developing effective optimizing compilers is an active area of research. Specifically, because loop nests are usually the hot spots in a program, their optimization has been the main subject of many optimization algorithms. This thesis aims to improve the scope and applicability of performance optimization algorithms used in …
Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss
Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss
All HCAS Student Capstones, Theses, and Dissertations
Trait-based ecology characterizes individuals’ functional attributes to better understand and predict their interactions with other species and their environments. Utilizing morphological traits to describe functional groups has helped group species with similar ecological niches that are not necessarily taxonomically related. Within the deep-pelagic fishes, the Order Stomiiformes exhibits high morphological and species diversity, and many species undertake diel vertical migration (DVM). While the morphology and behavior of stomiiform fishes have been extensively studied and described through taxonomic assessments, the connection between their form and function regarding their DVM types, morphotypes, and daytime depth distributions is not well known. Here, three …
Behaviors For Which Deinonychosaurs Used Their Feet, Alexander King
Behaviors For Which Deinonychosaurs Used Their Feet, Alexander King
Honors Projects
This paper seeks to show for what purpose deinonychosaurs used their feet. Fowler et al., (2011) showed that D. antirrhopus’s feet were closest in function to accipitrids, as they found it was more built for grasping prey than running.
I answered this question by using 2D images of the feet of three modern birds (Buteo jamaicensis, Phasianus colchicus, and Gallus gallus domesticus), one eudromaeosaur (Deinonychus antirrhopus), and one troodontid (Borogovia gracilicrus). I used ImageJ to apply 73 landmarks to each foot, capturing the variation between species in the metatarsals and pedal phalanges. These data were then uploaded to the software …
Evaluation Of Distributed Programming Models And Extensions To Task-Based Runtime Systems, Yu Pei
Evaluation Of Distributed Programming Models And Extensions To Task-Based Runtime Systems, Yu Pei
Doctoral Dissertations
High Performance Computing (HPC) has always been a key foundation for scientific simulation and discovery. And more recently, deep learning models' training have further accelerated the demand of computational power and lower precision arithmetic. In this era following the end of Dennard's Scaling and when Moore's Law seemingly still holds true to a lesser extent, it is not a coincidence that HPC systems are equipped with multi-cores CPUs and a variety of hardware accelerators that are all massively parallel. Coupling this with interconnect networks' speed improvements lagging behind those of computational power increases, the current state of HPC systems is …
Three Contributions To The Theory And Practice Of Optimizing Compilers, Linxiao Wang
Three Contributions To The Theory And Practice Of Optimizing Compilers, Linxiao Wang
Electronic Thesis and Dissertation Repository
The theory and practice of optimizing compilers gather techniques that, from input computer programs, aim at generating code making the best use of modern computer hardware. On the theory side, this thesis contributes new results and algorithms in polyhedral geometry. On the practical side, this thesis contributes techniques for the tuning of parameters of programs targeting GPUs. We detailed these two fronts of our work below.
Consider a convex polyhedral set P given by a system of linear inequalities A*x <= b, where A is an integer matrix and b is an integer vector. We are interested in the integer hull PI of P which is the smallest convex polyhedral set that contains all the integer points in P. In Chapter …=>
Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte
Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte
LSU Doctoral Dissertations
Modern computers can experience a variety of transient errors due to the surrounding environment, known as soft faults. Although the frequency of these faults is low enough to not be noticeable on personal computers, they become a considerable concern during large-scale distributed computations or systems in more vulnerable environments like satellites. These faults occur as a bit flip of some value in a register, operation, or memory during execution. They surface as either program crashes, hangs, or silent data corruption (SDC), each of which can waste time, money, and resources. Hardware methods, such as shielding or error correcting memory (ECM), …
Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy
Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy
Dissertations and Theses Collection (Open Access)
In this thesis, we study new variants of routing and scheduling problems motivated by real-world problems from the urban logistics and law enforcement domains. In particular, we focus on two key aspects: dynamic and multi-agent. While routing problems such as the Vehicle Routing Problem (VRP) is well-studied in the Operations Research (OR) community, we know that in real-world route planning today, initially-planned route plans and schedules may be disrupted by dynamically-occurring events. In addition, routing and scheduling plans cannot be done in silos due to the presence of other agents which may be independent and self-interested. These requirements create …