2,041 research outputs found

    A Transformational Approach to Resource Analysis with Typed-Norms

    Get PDF
    In order to automatically infer the resource consumption of programs, analyzers track how data sizes change along a program s execution. Typically, analyzers measure the sizes of data by applying norms which are mappings from data to natural numbers that represent the sizes of the corresponding data. When norms are defined by taking type information into account, they are named typed-norms. The main contribution of this paper is a transformational approach to resource analysis with typed-norms. The analysis is based on a transformation of the program into an intermediate abstract program in which each variable is abstracted with respect to all considered norms which are valid for its type. We also sketch a simple analysis that can be used to automatically infer the required, useful, typed-norms from programs.This work was funded partially by the EU project FP7-ICT-610582 ENVISAGE: Engineering Virtualized Services (http://www.envisage-project.eu) and by the Spanish projects TIN2008-05624 and TIN2012-38137. RaĂșl GutiĂ©rrez is also partially supported by a Juan de la Cierva Fellowship from the Spanish MINECO, ref. JCI-2012-13528.Albert Albiol, EM.; Genaim, S.; GutiĂ©rrez Gil, R. (2014). A Transformational Approach to Resource Analysis with Typed-Norms. Lecture Notes in Computer Science. 8901:38-53. https://doi.org/10.1007/978-3-319-14125-1_3S38538901Albert, E., Arenas, P., Genaim, S., GĂłmez-Zamalloa, M., Puebla, G.: Cost Analysis of Concurrent OO Programs. In: Yang, H. (ed.) APLAS 2011. LNCS, vol. 7078, pp. 238–254. Springer, Heidelberg (2011)Albert, E., Arenas, P., Genaim, S., Puebla, G., Zanardini, D.: Cost Analysis of Java Bytecode. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 157–172. Springer, Heidelberg (2007)Albert, E., Arenas, P., Genaim, S., Puebla, G., Zanardini, D.: Removing Useless Variables in Cost Analysis of Java Bytecode. In: Proc. of SAC 2008, pp. 368–375. ACM (2008)Alonso, D., Arenas, P., Genaim, S.: Handling Non-linear Operations in the Value Analysis of COSTA. In: Proc. of BYTECODE 2011. ENTCS, vol. 279, pp. 3–17. Elsevier (2011)Bossi, A., Cocco, N., Fabris, M.: Proving Termination of Logic Programs by Exploiting Term Properties. In: Proc. of TAPSOFT 1991. LNCS, vol. 494, pp. 153–180. Springer (1991)Bruynooghe, M., Codish, M., Gallagher, J., Genaim, S., Vanhoof, W.: Termination Analysis of Logic Programs through Combination of Type-Based norms. TOPLAS 29(2), Art. 10 (2007)Claessen, K., Hughes, J.: QuickCheck: A Lightweight Tool for Random Testing of Haskell Programs. In: Proc. of ICFP 2000, pp. 268–279. ACM (2000)FĂ€hndrich, M.: Static Verification for Code Contracts. In: Cousot, R., Martel, M. (eds.) SAS 2010. LNCS, vol. 6337, pp. 2–5. Springer, Heidelberg (2010)Genaim, S., Codish, M., Gallagher, J.P., Lagoon, V.: Combining Norms to Prove Termination. In: Cortesi, A. (ed.) VMCAI 2002. LNCS, vol. 2294, pp. 123–138. Springer, Heidelberg (2002)Johnsen, E.B., HĂ€hnle, R., SchĂ€fer, J., Schlatte, R., Steffen, M.: ABS: A Core Language for Abstract Behavioral Specification. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) Formal Methods for Components and Objects. LNCS, vol. 6957, pp. 142–164. Springer, Heidelberg (2011)King, A., Shen, K., Benoy, F.: Lower-bound Time-complexity Analysis of Logic Programs. In: Proc. of ILPS 1997, pp. 261–275. MIT Press (1997)Serrano, A., Lopez-Garcia, P., Bueno, F., Hermenegildo, M.: Sized Type Analysis for Logic Programs. In: Tech. Comms. of ICLP 2013. Cambridge U. Press (2013) (to appear)Spoto, F., Mesnard, F., Payet, É.: A Termination Analyser for Java Bytecode based on Path-Length. TOPLAS 32(3), Art. 8 (2010)VallĂ©e-Rai, R., Hendren, L., Sundaresan, V., Lam, P., Gagnon, E., Co, P.: Soot - a Java Optimization Framework. In: Proc. of CASCON 1999. pp. 125–135. IBM (1999)Vasconcelos, P.: Space Cost Analysis using Sized Types. Ph.D. thesis, School of CS, University of St. Andrews (2008)Vasconcelos, P.B., Hammond, K.: Inferring Cost Equations for Recursive, Polymorphic and Higher-Order Functional Programs. In: Trinder, P., Michaelson, G.J., Peña, R. (eds.) IFL 2003. LNCS, vol. 3145, pp. 86–101. Springer, Heidelberg (2004)Wegbreit, B.: Mechanical Program Analysis. Commun. ACM 18(9), 528–539 (1975

    12th International Workshop on Termination (WST 2012) : WST 2012, February 19–23, 2012, Obergurgl, Austria / ed. by Georg Moser

    Get PDF
    This volume contains the proceedings of the 12th International Workshop on Termination (WST 2012), to be held February 19–23, 2012 in Obergurgl, Austria. The goal of the Workshop on Termination is to be a venue for presentation and discussion of all topics in and around termination. In this way, the workshop tries to bridge the gaps between different communities interested and active in research in and around termination. The 12th International Workshop on Termination in Obergurgl continues the successful workshops held in St. Andrews (1993), La Bresse (1995), Ede (1997), Dagstuhl (1999), Utrecht (2001), Valencia (2003), Aachen (2004), Seattle (2006), Paris (2007), Leipzig (2009), and Edinburgh (2010). The 12th International Workshop on Termination did welcome contributions on all aspects of termination and complexity analysis. Contributions from the imperative, constraint, functional, and logic programming communities, and papers investigating applications of complexity or termination (for example in program transformation or theorem proving) were particularly welcome. We did receive 18 submissions which all were accepted. Each paper was assigned two reviewers. In addition to these 18 contributed talks, WST 2012, hosts three invited talks by Alexander Krauss, Martin Hofmann, and Fausto Spoto

    Verifying Catamorphism-Based Contracts using Constrained Horn Clauses

    Full text link
    We address the problem of verifying that the functions of a program meet their contracts, specified by pre/postconditions. We follow an approach based on constrained Horn clauses (CHCs) by which the verification problem is reduced to the problem of checking satisfiability of a set of clauses derived from the given program and contracts. We consider programs that manipulate algebraic data types (ADTs) and a class of contracts specified by catamorphisms, that is, functions defined by simple recursion schemata on the given ADTs. We show by several examples that state-of-the-art CHC satisfiability tools are not effective at solving the satisfiability problems obtained by direct translation of the contracts into CHCs. To overcome this difficulty, we propose a transformation technique that removes the ADT terms from CHCs and derives new sets of clauses that work on basic sorts only, such as integers and booleans. Thus, when using the derived CHCs there is no need for induction rules on ADTs. We prove that the transformation is sound, that is, if the derived set of CHCs is satisfiable, then so is the original set. We also prove that the transformation always terminates for the class of contracts specified by catamorphisms. Finally, we present the experimental results obtained by an implementation of our technique when verifying many non-trivial contracts for ADT manipulating programs.Comment: Paper presented at the 38th International Conference on Logic Programming (ICLP 2022), 16 pages; added Journal reference and related DO

    How Women in Leadership Describe Their Rise to Leadership in Nigeria

    Get PDF
    The significance of female marginalization and inclusion in leadership decision making has been increasingly a topic of deliberation. Women and men share typical characteristics such as knowledge, educational qualification, expertise, socioeconomic status, yet women are continuously marginalized. The bias that women face because of their gender is a lot more pronounced in countries where the traditional roles of the sexes are defined rigidly. Due to these strict gender roles, women find it hard to get to the positions of leadership in organizations. Gender discrimination against women in the workplace is a common issue that women around the world face. Leadership becomes almost impossible for women in countries, especially in the African region, where women become dependent on their partners, and they have to live in any circumstances that are made available to them. Although the number of working women is increasing in these regions, these women still face workplace discrimination almost daily. The purpose of this case study is to understand how women in leadership describe their rise to leadership in Nigeria. The theory guiding this study is Heilman\u27s (1983) lack of fit model. This is the most well-known theory that concentrates on unfairness against women leaders. Qualitative method was used in this research because of its distinctive methodological traditions of inquiry that explores a human socio problem. Participants were Nigerian women in leadership positions. Interviews were carried out with participants; themes were aligned for multiple participants such as education, culture, sexuality as well as authentic leadership

    Cultural intelligence and leadership style in the education sector

    Get PDF
    Purpose: Schools in UAE are multicultural in nature. In this context, cultural intelligence (CQ) is a tool, which can increase an individual’s ability to interact with people outside his/her culture. The purpose of this paper is to explore the perceptions of the school leaders regarding the key influences of cultural intelligence on their ability to adapt their leadership style in the Abu Dhabi Education Sector. Design/methodology/approach: An extensive review of the literature was carried out to acknowledge the cultural intelligence and leadership style adaptability concepts. This research has adopted a qualitative method of inquiry. Data for the study have been collected from three focus groups with 14 schools leaders in the Emirate of Abu Dhabi. Findings: This pilot study reveals that cultural intelligence has some influence on the school leaders’ ability to adapt their leadership style within a diverse work environment. This influence is complex in nature and multiple factors have been identified. Research limitations/implications: The main limitations of this study are associated with the small sample size. Regarding the implications, while this study was conducted in a UAE cultural context, it can be extended to other Gulf countries. Future research should prompt educational leaders, administrators, students, and research academics to further consider the impact of cultural intelligence on leadership style. Practical implications: This study contributes towards cultural intelligence literature. Schools should provide cultural training to managers before appointing them to leadership positions, which helps in understanding the culture which they are going to operate in, and effectively manage their drives, workforce, students, and the community. Originality/value: The paper highlights six core factors that influence the ability of school leaders to adapt their leadership style in culturally diverse environments. These preliminary factors need to be examined further to validate the dimensions of leadership adaptability in various contexts

    Fear and Compliance: A Study of Antecedents, Mediators and Benefits of Paternalistic Leadership in China

    Get PDF
    Paternalistic leadership has been suggested as one prevalent leadership style in China. However, empirical research is limited in investigating the predictive factors as well as its correlations with organisational outcome measures. Drawing upon a total sample of 850 leader-subordinate dyads from mainland China, this research attempts to depict a comprehensive picture of paternalistic leadership, by examining its antecedents, outcomes, mediators, and moderators. Included are three independent empirical studies. Study 1 investigates the antecedents of paternalistic leadership. By examining a cross-lagged model, it is found that followers’ trust-in-supervisor can impact their ratings of leader paternalistic leadership across time, and such impact is further moderated by individual external locus of control by powerful others. In Study 2, by testing a three-way interaction model, it is found that authoritarian leadership has a positive impact on employees’ culture-specific organisational citizenship behaviour; and benevolent leadership and employee resource dependence jointly play critical roles for authoritarian leadership in generating such positive impact. Finally, in Study 3, by investigating a moderated mediation model, authoritarian leadership has been found to negatively impact on followers’ job performance via followers’ fear of their supervisors. This mediation effect is also moderated by follower gender, which demonstrates that the mediation effect only takes place in female followers, but not in male followers. Theoretical and practical limitations and directions for follow-up research are discussed. Overall, the assessment of both antecedents and outcomes of paternalistic leadership in this thesis is essential for the emerging research on paternalistic leadership. Keywords: paternalistic leadership, trust-in-supervisor, fear, resource dependence, job performance, organisational citizenship behaviour
    • 

    corecore