6,186 research outputs found

    Recovering fitness gradients for interprocedural Boolean flags in search-based testing

    Get PDF
    National Research Foundation (NRF) Singapore under Corp Lab @ University scheme; National Research Foundation (NRF) Singapore under its NSoE Programm

    Filtering speed in a continental European reorganization procedure.

    Get PDF
    Recent studies of U.S. Chapter 11 show it to be a relatively efficient procedure. We examine reorganization cases in a Continental European, creditor-oriented bankruptcy system, viz. Belgium, and report very different findings. Using hazard and cure regression models to determine what drives the length of time spent in reorganizations, we find evidence suggesting that courts have little impact on the screening and filtering process. In fact, virtually all drivers of procedure length prove to have the opposite sign of what one would expect if the procedure would efficiently realise its goals. Instead, the procedure appears to be mainly creditor driven.Reorganization; Bankruptcy; Hazard models; Filtering speed;

    Algorithms that Remember: Model Inversion Attacks and Data Protection Law

    Get PDF
    Many individuals are concerned about the governance of machine learning systems and the prevention of algorithmic harms. The EU's recent General Data Protection Regulation (GDPR) has been seen as a core tool for achieving better governance of this area. While the GDPR does apply to the use of models in some limited situations, most of its provisions relate to the governance of personal data, while models have traditionally been seen as intellectual property. We present recent work from the information security literature around `model inversion' and `membership inference' attacks, which indicate that the process of turning training data into machine learned systems is not one-way, and demonstrate how this could lead some models to be legally classified as personal data. Taking this as a probing experiment, we explore the different rights and obligations this would trigger and their utility, and posit future directions for algorithmic governance and regulation.Comment: 15 pages, 1 figur

    Space station advanced automation

    Get PDF
    In the development of a safe, productive and maintainable space station, Automation and Robotics (A and R) has been identified as an enabling technology which will allow efficient operation at a reasonable cost. The Space Station Freedom's (SSF) systems are very complex, and interdependent. The usage of Advanced Automation (AA) will help restructure, and integrate system status so that station and ground personnel can operate more efficiently. To use AA technology for the augmentation of system management functions requires a development model which consists of well defined phases of: evaluation, development, integration, and maintenance. The evaluation phase will consider system management functions against traditional solutions, implementation techniques and requirements; the end result of this phase should be a well developed concept along with a feasibility analysis. In the development phase the AA system will be developed in accordance with a traditional Life Cycle Model (LCM) modified for Knowledge Based System (KBS) applications. A way by which both knowledge bases and reasoning techniques can be reused to control costs is explained. During the integration phase the KBS software must be integrated with conventional software, and verified and validated. The Verification and Validation (V and V) techniques applicable to these KBS are based on the ideas of consistency, minimal competency, and graph theory. The maintenance phase will be aided by having well designed and documented KBS software

    Real Option Valuation of a Portfolio of Oil Projects

    Get PDF
    Various methodologies exist for valuing companies and their projects. We address the problem of valuing a portfolio of projects within companies that have infrequent, large and volatile cash flows. Examples of this type of company exist in oil exploration and development and we will use this example to illustrate our analysis throughout the thesis. The theoretical interest in this problem lies in modeling the sources of risk in the projects and their different interactions within each project. Initially we look at the advantages of real options analysis and compare this approach with more traditional valuation methods, highlighting strengths and weaknesses ofeach approach in the light ofthe thesis problem. We give the background to the stages in an oil exploration and development project and identify the main common sources of risk, for example commodity prices. We discuss the appropriate representation for oil prices; in short, do oil prices behave more like equities or more like interest rates? The appropriate representation is used to model oil price as a source ofrisk. A real option valuation model based on market uncertainty (in the form of oil price risk) and geological uncertainty (reserve volume uncertainty) is presented and tested for two different oil projects. Finally, a methodology to measure the inter-relationship between oil price and other sources of risk such as interest rates is proposed using copula methods.Imperial Users onl

    Comparing the effectiveness of equivalence partitioning, branch testing and code reading by stepwise abstraction applied by subjects

    Get PDF
    Some verification and validation techniques have been evaluated both theoretically and empirically. Most empirical studies have been conducted without subjects, passing over any effect testers have when they apply the techniques. We have run an experiment with students to evaluate the effectiveness of three verification and validation techniques (equivalence partitioning, branch testing and code reading by stepwise abstraction). We have studied how well able the techniques are to reveal defects in three programs. We have replicated the experiment eight times at different sites. Our results show that equivalence partitioning and branch testing are equally effective and better than code reading by stepwise abstraction. The effectiveness of code reading by stepwise abstraction varies significantly from program to program. Finally, we have identified project contextual variables that should be considered when applying any verification and validation technique or to choose one particular technique
    • 

    corecore