8,761 research outputs found

    Affine Sessions

    Full text link
    Session types describe the structure of communications implemented by channels. In particular, they prescribe the sequence of communications, whether they are input or output actions, and the type of value exchanged. Crucial to any language with session types is the notion of linearity, which is essential to ensure that channels exhibit the behaviour prescribed by their type without interference in the presence of concurrency. In this work we relax the condition of linearity to that of affinity, by which channels exhibit at most the behaviour prescribed by their types. This more liberal setting allows us to incorporate an elegant error handling mechanism which simplifies and improves related works on exceptions. Moreover, our treatment does not affect the progress properties of the language: sessions never get stuck

    Cross-Talk-Free Multi-Color STORM Imaging Using a Single Fluorophore

    Get PDF
    Multi-color stochastic optical reconstruction microscopy (STORM) is routinely performed; however, the various approaches for achieving multiple colors have important caveats. Color cross-talk, limited availability of spectrally distinct fluorophores with optimal brightness and duty cycle, incompatibility of imaging buffers for different fluorophores, and chromatic aberrations impact the spatial resolution and ultimately the number of colors that can be achieved. We overcome these complexities and develop a simple approach for multi-color STORM imaging using a single fluorophore and sequential labelling. In addition, we present a simple and versatile method to locate the same region of interest on different days and even on different microscopes. In combination, these approaches enable cross-talk-free multi-color imaging of sub-cellular structures.Peer ReviewedPostprint (published version

    Estimating the Leverage Parameter of Continuous-time Stochastic Volatility Models Using High Frequency S&P 500 and VIX

    Get PDF
    This paper proposes a new method for estimating continuous-time stochastic volatility (SV) models for the S&P 500 stock index process using intraday high-frequency observations of both the S&P 500 index and the Chicago Board of Exchange (CBOE) implied (or expected) volatility index (VIX). Intraday high-frequency observations data have become readily available for an increasing number of financial assets and their derivatives in recent years, but it is well known that attempts to directly apply popular continuous-time models to short intraday time intervals, and estimate the parameters using such data, can lead to nonsensical estimates due to severe intraday seasonality. A primary purpose of the paper is to provide a framework for using intraday high frequency data of both the index estimate, in particular, for improving the estimation accuracy of the leverage parameter, , that is, the correlation between the two Brownian motions driving the diffusive components of the price process and its spot variance process, respectively. As a special case, we focus on Heston’s (1993) square-root SV model, and propose the realized leverage estimator for , noting that, under this model without measurement errors, the “realized leverage,” or the realized covariation of the price and VIX processes divided by the product of the realized volatilities of the two processes, is in-fill consistent for  . Finite sample simulation results show that the proposed estimator delivers more accurate estimates of the leverage parameter than do existing methods.Continuous time, high frequency data, stochastic volatility, S&P 500, implied volatility, VIX.

    Combining behavioural types with security analysis

    Get PDF
    Today's software systems are highly distributed and interconnected, and they increasingly rely on communication to achieve their goals; due to their societal importance, security and trustworthiness are crucial aspects for the correctness of these systems. Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforcement of correctness properties in communicating systems. This paper offers a unified overview of proposals based on behavioural types which are aimed at the analysis of security properties
    corecore