Advanced search
Showing result 1 - 5 of 31 swedish dissertations matching the above criteria.
-
1. From Declarative Models to Local Search
Abstract : A solver is a general-purpose software for solving optimisation problems. It takes as input a description of a problem, called a model, and uses a collection of algorithms, called its solving technology, to ideally produce an optimal solution as output. Most solvers have a modelling language that cannot be processed by other solvers. READ MORE
-
2. Object-Oriented Declarative Program Analysis
Abstract : This thesis deals with techniques for raising the programming level for a particular kind of computations, namely those on abstract syntax trees. Such computations are central in many program analysis tools, such as compilers, smart language-sensitive editors, and static analysis tools. READ MORE
-
3. Graphic Representation and Visualisation as Modelling Support for the Knowledge Acquisition Process
Abstract : The thesis describes steps taken towards using graphic representation and visual modelling support for the knowledge acquisition process in knowledge-based systems – a process commonly regarded as difficult. The performance of the systems depends on the quality of the embedded knowledge, which makes the knowledge acquisition phase particularly significant. READ MORE
-
4. Computational Issues in Calculi of Partial Inductive Definitions
Abstract : We study the properties of a number of algorithms proposed to explore the computational space generated by a very simple and general idea: the notion of a mathematical definition and a number of suggested formal interpretations ofthis idea. Theories of partial inductive definitions (PID) constitute a class of logics based on the notion of an inductive definition. READ MORE
-
5. Functional Programming for Securing Cloud and Embedded Environments
Abstract : The ubiquity of digital systems across all aspects of modern society, while beneficial, has simultaneously exposed a lucrative attack surface for potential adversaries and attackers. Consequently, securing digital systems becomes of critical importance. READ MORE