2,041 research outputs found
A Transformational Approach to Resource Analysis with Typed-Norms
In order to automatically infer the resource consumption of programs, analyzers track how data sizes change along a program s execution. Typically, analyzers measure the sizes of data by applying norms which are mappings from data to natural numbers that represent the sizes of the corresponding data. When norms are defined by taking type information into account, they are named typed-norms. The main contribution of this paper is a transformational approach to resource analysis with typed-norms. The analysis is based on a transformation of the program into an intermediate abstract program in which each variable is abstracted with respect to all considered norms which are valid for its type. We also sketch a simple analysis that can be used to automatically infer the required, useful, typed-norms from programs.This work was funded partially by the EU project FP7-ICT-610582 ENVISAGE: Engineering Virtualized Services (http://www.envisage-project.eu) and by the Spanish projects TIN2008-05624 and TIN2012-38137. RaĂșl GutiĂ©rrez is also partially supported by a Juan de la Cierva Fellowship from the Spanish MINECO, ref. JCI-2012-13528.Albert Albiol, EM.; Genaim, S.; GutiĂ©rrez Gil, R. (2014). A Transformational Approach to Resource Analysis with Typed-Norms. Lecture Notes in Computer Science. 8901:38-53. https://doi.org/10.1007/978-3-319-14125-1_3S38538901Albert, E., Arenas, P., Genaim, S., GĂłmez-Zamalloa, M., Puebla, G.: Cost Analysis of Concurrent OO Programs. In: Yang, H. (ed.) APLAS 2011. LNCS, vol. 7078, pp. 238â254. Springer, Heidelberg (2011)Albert, E., Arenas, P., Genaim, S., Puebla, G., Zanardini, D.: Cost Analysis of Java Bytecode. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 157â172. Springer, Heidelberg (2007)Albert, E., Arenas, P., Genaim, S., Puebla, G., Zanardini, D.: Removing Useless Variables in Cost Analysis of Java Bytecode. In: Proc. of SAC 2008, pp. 368â375. ACM (2008)Alonso, D., Arenas, P., Genaim, S.: Handling Non-linear Operations in the Value Analysis of COSTA. In: Proc. of BYTECODE 2011. ENTCS, vol. 279, pp. 3â17. Elsevier (2011)Bossi, A., Cocco, N., Fabris, M.: Proving Termination of Logic Programs by Exploiting Term Properties. In: Proc. of TAPSOFT 1991. LNCS, vol. 494, pp. 153â180. Springer (1991)Bruynooghe, M., Codish, M., Gallagher, J., Genaim, S., Vanhoof, W.: Termination Analysis of Logic Programs through Combination of Type-Based norms. TOPLAS 29(2), Art. 10 (2007)Claessen, K., Hughes, J.: QuickCheck: A Lightweight Tool for Random Testing of Haskell Programs. In: Proc. of ICFP 2000, pp. 268â279. ACM (2000)FĂ€hndrich, M.: Static Verification for Code Contracts. In: Cousot, R., Martel, M. (eds.) SAS 2010. LNCS, vol. 6337, pp. 2â5. Springer, Heidelberg (2010)Genaim, S., Codish, M., Gallagher, J.P., Lagoon, V.: Combining Norms to Prove Termination. In: Cortesi, A. (ed.) VMCAI 2002. LNCS, vol. 2294, pp. 123â138. Springer, Heidelberg (2002)Johnsen, E.B., HĂ€hnle, R., SchĂ€fer, J., Schlatte, R., Steffen, M.: ABS: A Core Language for Abstract Behavioral Specification. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) Formal Methods for Components and Objects. LNCS, vol. 6957, pp. 142â164. Springer, Heidelberg (2011)King, A., Shen, K., Benoy, F.: Lower-bound Time-complexity Analysis of Logic Programs. In: Proc. of ILPS 1997, pp. 261â275. MIT Press (1997)Serrano, A., Lopez-Garcia, P., Bueno, F., Hermenegildo, M.: Sized Type Analysis for Logic Programs. In: Tech. Comms. of ICLP 2013. Cambridge U. Press (2013) (to appear)Spoto, F., Mesnard, F., Payet, Ă.: A Termination Analyser for Java Bytecode based on Path-Length. TOPLAS 32(3), Art. 8 (2010)VallĂ©e-Rai, R., Hendren, L., Sundaresan, V., Lam, P., Gagnon, E., Co, P.: Soot - a Java Optimization Framework. In: Proc. of CASCON 1999. pp. 125â135. IBM (1999)Vasconcelos, P.: Space Cost Analysis using Sized Types. Ph.D. thesis, School of CS, University of St. Andrews (2008)Vasconcelos, P.B., Hammond, K.: Inferring Cost Equations for Recursive, Polymorphic and Higher-Order Functional Programs. In: Trinder, P., Michaelson, G.J., Peña, R. (eds.) IFL 2003. LNCS, vol. 3145, pp. 86â101. Springer, Heidelberg (2004)Wegbreit, B.: Mechanical Program Analysis. Commun. ACM 18(9), 528â539 (1975
12th International Workshop on Termination (WST 2012) : WST 2012, February 19â23, 2012, Obergurgl, Austria / ed. by Georg Moser
This volume contains the proceedings of the 12th International Workshop on Termination (WST 2012), to be held February 19â23, 2012 in Obergurgl, Austria. The goal of the Workshop on Termination is to be a venue for presentation and discussion of all topics in and around termination. In this way, the workshop tries to bridge the gaps between different communities interested and active in research in and around termination. The 12th International Workshop on Termination in Obergurgl continues the successful workshops held in St. Andrews (1993), La Bresse (1995), Ede (1997), Dagstuhl (1999), Utrecht (2001), Valencia (2003), Aachen (2004), Seattle (2006), Paris (2007), Leipzig (2009), and Edinburgh (2010). The 12th International Workshop on Termination did welcome contributions on all aspects of termination and complexity analysis. Contributions from the imperative, constraint, functional, and logic programming communities, and papers investigating applications of complexity or termination (for example in program transformation or theorem proving) were particularly welcome. We did receive 18 submissions which all were accepted. Each paper was assigned two reviewers. In addition to these 18 contributed talks, WST 2012, hosts three invited talks by Alexander Krauss, Martin Hofmann, and Fausto Spoto
Recommended from our members
Generating citizen trust in e-government using a trust verification agent: A research note
Generating Citizen Trust in e-Government using a Trust Verification AgentThis is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizenâs take-up of online public sector services or engagement with public decision and
policy making. A citizenâs decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual âtrustâ decisions by
providing support for citizens trying to evaluate the implications of the security infrastructure provided by the agency. Based on studies of the way both groups (citizens and agencies) express their concerns and concepts in the security area, the project will develop a software tool â a trust
verification agent (TVA) - that can take an agencyâs security statements (or security audit) and infer how effectively this meets the security concerns of a particular citizen. This will enable citizens to state
their concerns and obtain an evaluation of the agencyâs provision in appropriate âcitizen friendlyâ language. Further, by employing rule-based expert systems techniques the TVA will also be able to explain its evaluation.Engineering and Physical Sciences Research Council, UK (grant GR/T27020/01
Recommended from our members
Generating citizen trust in e-government using a trust verification agent: A research note
Generating Citizen Trust in e-Government using a Trust Verification AgentThis is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizenâs take-up of online public sector services or engagement with public decision and policy making. A citizenâs decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual âtrustâ decisions by
providing support for citizens trying to evaluate the implications of the security infrastructure provided by the agency. Based on studies of the way both groups (citizens and agencies) express their concerns and concepts in the security area, the project will develop a software tool â a trust
verification agent (TVA) - that can take an agencyâs security statements (or security audit) and infer how effectively this meets the security concerns of a particular citizen. This will enable citizens to state
their concerns and obtain an evaluation of the agencyâs provision in appropriate âcitizen friendlyâ
language. Further, by employing rule-based expert systems techniques the TVA will also be able to explain its evaluation.Engineering and Physical Sciences Research Council-UK (grant GR/T27020/01
Verifying Catamorphism-Based Contracts using Constrained Horn Clauses
We address the problem of verifying that the functions of a program meet
their contracts, specified by pre/postconditions. We follow an approach based
on constrained Horn clauses (CHCs) by which the verification problem is reduced
to the problem of checking satisfiability of a set of clauses derived from the
given program and contracts. We consider programs that manipulate algebraic
data types (ADTs) and a class of contracts specified by catamorphisms, that is,
functions defined by simple recursion schemata on the given ADTs. We show by
several examples that state-of-the-art CHC satisfiability tools are not
effective at solving the satisfiability problems obtained by direct translation
of the contracts into CHCs. To overcome this difficulty, we propose a
transformation technique that removes the ADT terms from CHCs and derives new
sets of clauses that work on basic sorts only, such as integers and booleans.
Thus, when using the derived CHCs there is no need for induction rules on ADTs.
We prove that the transformation is sound, that is, if the derived set of CHCs
is satisfiable, then so is the original set. We also prove that the
transformation always terminates for the class of contracts specified by
catamorphisms. Finally, we present the experimental results obtained by an
implementation of our technique when verifying many non-trivial contracts for
ADT manipulating programs.Comment: Paper presented at the 38th International Conference on Logic
Programming (ICLP 2022), 16 pages; added Journal reference and related DO
How Women in Leadership Describe Their Rise to Leadership in Nigeria
The significance of female marginalization and inclusion in leadership decision making has been increasingly a topic of deliberation. Women and men share typical characteristics such as knowledge, educational qualification, expertise, socioeconomic status, yet women are continuously marginalized. The bias that women face because of their gender is a lot more pronounced in countries where the traditional roles of the sexes are defined rigidly. Due to these strict gender roles, women find it hard to get to the positions of leadership in organizations. Gender discrimination against women in the workplace is a common issue that women around the world face. Leadership becomes almost impossible for women in countries, especially in the African region, where women become dependent on their partners, and they have to live in any circumstances that are made available to them. Although the number of working women is increasing in these regions, these women still face workplace discrimination almost daily. The purpose of this case study is to understand how women in leadership describe their rise to leadership in Nigeria. The theory guiding this study is Heilman\u27s (1983) lack of fit model. This is the most well-known theory that concentrates on unfairness against women leaders. Qualitative method was used in this research because of its distinctive methodological traditions of inquiry that explores a human socio problem. Participants were Nigerian women in leadership positions. Interviews were carried out with participants; themes were aligned for multiple participants such as education, culture, sexuality as well as authentic leadership
Cultural intelligence and leadership style in the education sector
Purpose: Schools in UAE are multicultural in nature. In this context, cultural intelligence (CQ) is a tool, which can increase an individualâs ability to interact with people outside his/her culture. The purpose of this paper is to explore the perceptions of the school leaders regarding the key influences of cultural intelligence on their ability to adapt their leadership style in the Abu Dhabi Education Sector. Design/methodology/approach: An extensive review of the literature was carried out to acknowledge the cultural intelligence and leadership style adaptability concepts. This research has adopted a qualitative method of inquiry. Data for the study have been collected from three focus groups with 14 schools leaders in the Emirate of Abu Dhabi. Findings: This pilot study reveals that cultural intelligence has some influence on the school leadersâ ability to adapt their leadership style within a diverse work environment. This influence is complex in nature and multiple factors have been identified. Research limitations/implications: The main limitations of this study are associated with the small sample size. Regarding the implications, while this study was conducted in a UAE cultural context, it can be extended to other Gulf countries. Future research should prompt educational leaders, administrators, students, and research academics to further consider the impact of cultural intelligence on leadership style. Practical implications: This study contributes towards cultural intelligence literature. Schools should provide cultural training to managers before appointing them to leadership positions, which helps in understanding the culture which they are going to operate in, and effectively manage their drives, workforce, students, and the community. Originality/value: The paper highlights six core factors that influence the ability of school leaders to adapt their leadership style in culturally diverse environments. These preliminary factors need to be examined further to validate the dimensions of leadership adaptability in various contexts
Fear and Compliance: A Study of Antecedents, Mediators and Benefits of Paternalistic Leadership in China
Paternalistic leadership has been suggested as one prevalent leadership style in China. However, empirical research is limited in investigating the predictive factors as well as its correlations with organisational outcome measures. Drawing upon a total sample of 850 leader-subordinate dyads from mainland China, this research attempts to depict a comprehensive picture of paternalistic leadership, by examining its antecedents, outcomes, mediators, and moderators. Included are three independent empirical studies. Study 1 investigates the antecedents of paternalistic leadership. By examining a cross-lagged model, it is found that followersâ trust-in-supervisor can impact their ratings of leader paternalistic leadership across time, and such impact is further moderated by individual external locus of control by powerful others. In Study 2, by testing a three-way interaction model, it is found that authoritarian leadership has a positive impact on employeesâ culture-specific organisational citizenship behaviour; and benevolent leadership and employee resource dependence jointly play critical roles for authoritarian leadership in generating such positive impact. Finally, in Study 3, by investigating a moderated mediation model, authoritarian leadership has been found to negatively impact on followersâ job performance via followersâ fear of their supervisors. This mediation effect is also moderated by follower gender, which demonstrates that the mediation effect only takes place in female followers, but not in male followers. Theoretical and practical limitations and directions for follow-up research are discussed. Overall, the assessment of both antecedents and outcomes of paternalistic leadership in this thesis is essential for the emerging research on paternalistic leadership.
Keywords: paternalistic leadership, trust-in-supervisor, fear, resource dependence, job performance, organisational citizenship behaviour
- âŠ