Open Access Repositories: Recent submissions
Now showing items 1421-1440 of 4204
-
The symplectic arc algebra is formal
(Duke University PressDuke Mathematical Journal, 2016-01-28)We prove a formality theorem for the Fukaya categories of the symplectic manifolds underlying symplectic Khovanov cohomology over fields of characteristic zero. The key ingredient is the construction of a degree-one ...
-
PhD Thesis Proposal: Human-Machine Collaborative Optimization via Apprenticeship Scheduling
(2015-07-02)Resource optimization in health care, manufacturing, and military operations requires the careful choreography of people and equipment to effectively fulfill the responsibilities of the profession. However, resource ...
-
Supporting NGO intermediation with internet systems : comparing mobile and web examples for reaching low income urban youth of Cape Town
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)Intermediaries are necessary to overcome challenges of Internet use for many users in the developing world. However the need for co-presence with intermediaries can be inconvenient for beneficiaries, and the process is ...
-
Participatory cloud computing : the community cloud management protocol
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)This thesis work takes an investigative approach into developing a middleware solution for managing services in a community cloud computing infrastructure pre-dominantly made of interconnected low power wireless devices. ...
-
A parallel multidimensional weighted histogram analysis method
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)The Weighted Histogram Analysis Method (WHAM) is a technique used to calculate free energy from molecular simulation data. WHAM recombines biased distributions of samples from multiple Umbrella Sampling simulations to yield ...
-
Internet of things : least interference beaconing algorithms
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)The emerging sensor networking applications are predicting the deployment of sensor devices in thousands of computing elements into multi-technology and multi-protocol platforms. Access to information will be available not ...
-
Ubiquitous mesh networking : application to mobile communication and information dissemination in a rural context
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)ICT has furthered the social and economic development of societies but, rural African communities have lagged behind due to issues such as sparse population, low household income, a lack of electricity and other basic ...
-
Small-amplitude swimmers can self-propel faster in viscoelastic fluids
(ElsevierJournal of Theoretical Biology, 2015-07-08)Many small organisms self-propel in viscous fluids using travelling wave-like deformations of their bodies or appendages. Examples include small nematodes moving through soil using whole-body undulations or spermatozoa ...
-
Force field comparison through computational analysis of capsular polysaccharides of Streptococcus pneumoniae serotypes 19A and F
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)Modern Molecular Dynamics force fields, such as the CHARMM36 and GLYCAM06carbohydrate force fields, are parametrised to reproduce behaviours for specific molecules under specific conditions in order to be able to predict ...
-
Guaranteeing Spoof-Resilient Multi-Robot Networks
(July 2015)Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them ...
-
Value-Deviation-Bounded Serial Data Encoding for Energy-Efficient Approximate Communication
(2015-06-04)Transferring data between ICs accounts for a growing proportion of system power in wearable and mobile systems. Reducing signal transitions reduces the dynamic power dissipated in this data transfer, but traditional ...
-
Homological stability for spaces of embedded surfaces
(Mathematical Sciences PublisherGeometry and Topology, 2017-05-10)© 2017, Mathematical Sciences Publishers. All rights reserved.We study the space of oriented genus-g subsurfaces of a fixed manifold M and, in particular, its homological properties. We construct a “scanning map” which ...
-
An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems
(2015-05-29)We analyze reported patches for three existing generate-and-validate patch generation systems (GenProg, RSRepair, and AE). The basic principle behind generate-and-validate systems is to accept only plausible patches that ...
-
Designing an architecture for secure sharing of personal health records : a case of developing countries
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite ...
-
Volumetric cloud generation using a Chinese brush calligraphy style
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)Clouds are an important feature of any real or simulated environment in which the sky is visible. Their amorphous, ever-changing and illuminated features make the sky vivid and beautiful. However, these features increase ...
-
Semi-automatic matching of semi-structured data updates
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)Data matching, also referred to as data linkage or field matching, is a technique used to combine multiple data sources into one data set. Data matching is used for data integration in a number of sectors and industries; ...
-
Multi-layered security in the Internet of the Things
(University of Cape TownFaculty of ScienceDepartment of Computer Science, 2014)It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a ...
-
An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems
(2015-05-26)We analyze reported patches for three existing generate-and-validate patch generation systems (GenProg, RSRepair, and AE). The basic principle behind generate-and-validate systems is to accept only plausible patches that ...
-
Prophet: Automatic Patch Generation via Learning from Successful Human Patches
(2015-05-26)We present Prophet, a novel patch generation system that learns a probabilistic model over candidate patches from a large code database that contains many past successful human patches. It defines the probabilistic model ...
-
Automatic Discovery and Patching of Buffer and Integer Overflow Errors
(2015-05-26)We present Targeted Automatic Patching (TAP), an automatic buffer and integer overflow discovery and patching system. Starting with an application and a seed input that the application processes correctly, TAP dynamically ...
