Search for dissertations about: "Computer science chalmers"
Showing result 1 - 5 of 192 swedish dissertations containing the words Computer science chalmers.
-
1. Lock-free Concurrent Search
Abstract : The contemporary computers typically consist of multiple computing cores with high compute power. Such computers make excellent concurrent asynchronous shared memory system. READ MORE
-
2. Explainable and Resource-Efficient Stream Processing Through Provenance and Scheduling
Abstract : In our era of big data, information is captured at unprecedented volumes and velocities, with technologies such as Cyber-Physical Systems making quick decisions based on the processing of streaming, unbounded datasets. In such scenarios, it can be beneficial to process the data in an online manner, using the stream processing paradigm implemented by Stream Processing Engines (SPEs). READ MORE
-
3. Sparse Voxel DAGs for Shadows and for Geometry with Colors
Abstract : Triangles are probably the most common format for shapes in computer graphics. Nevertheless, when high detail is desired, Sparse Voxel Octrees (SVO) and Sparse Voxel Directed Acyclic Graphs (DAG) can be considerably more memory efficient. One of the first practical use cases for DAGs was to use the structure to represent precomputed shadows. READ MORE
-
4. Throughput and energy efficiency of lock-free data structures: Execution Models and Analyses
Abstract : Concurrent data structures are key program components to harness the available parallelism in multi-core processors. Lock-free algorithmic implementations of concurrent data structures offer high scalability and possess desirable properties such as immunity to deadlocks, convoying and priority inversion. READ MORE
-
5. Cryptographic Tools for Privacy Preservation and Verifiable Randomness
Abstract : Our society revolves around communication. The Internet is the biggest, cheapest and fastest digital communication channel used nowadays. Due to the continuous increase of daily communication among people worldwide, more and more data might be stolen, misused or tampered. READ MORE