2,460 research outputs found

    Object and Source Coverage for Critical Applications with the C OUVERTURE Open Analysis Framework

    Get PDF
    International audienceThis paper presents C OUVERTURE , an open coverage analysis framework for safety-critical software development.C OUVERTURE offers non-intrusive source and object coverage analysis on unmodified user code, using instrumentation of a virtual execution platform based on QEMU , a flexible and efficient open-source CPU emulator

    Industry-mandated testing to improve food safety: the new US marketing order for pistachios

    Get PDF
    Food safety shocks can threaten the health of consumers, create havoc within an industry and result in severe losses to producers. Governments often attempt to aid food safety by mandating standards and inspection of food products to supplement the efforts by private firms and industries. This article assesses a form of collective action that falls between typical government mandates and purely private action. The California pistachio industry recently established a U.S. federal marketing order, which sets quality standards and inspection to reduce the likelihood of dangerous or poor quality pistachios. Simulation results indicate that, across the full range of parameters used in the analysis, the benefit-cost analysis was always favorable to the new policy. In the case of California pistachios, collective action is likely to be a helpful tool to ensure a safe product and increase benefits to producers and consumers.food safety, food scare, collective action, marketing orders, pistachios, public good, food regulations, cost-benefit analysis, Agribusiness, Food Consumption/Nutrition/Food Safety,

    Deepening Understanding of Certification Adoption and Non-Adoption of International-Supplier Ethical Standards

    Get PDF
    This study presents a theory of causally complex configurations of antecedent conditions influencing the adoption versus non-adoption of international supplier ethical certification-standards. Using objective measures of antecedents and outcomes, a large-scale study of exporting firms in the cut-flower industry in two South American countries (Colombia and Ecuador) supports the theory. The theory includes the following and additional propositions. No single (simple)-antecedent condition is sufficient for accurately predicting a high membership score in outcome conditions; the outcome conditions include a firm’s adoption or rejection of a product certification. No single (simple)-antecedent condition is necessary for accurately predicting high scores in the outcome condition. A few complex antecedent conditions (configurations) are sufficient but the occurrence of each is not necessary for accurately predicting high scores (e.g., adoption) in an outcome condition. Causal asymmetry of antecedent conditions indicating adoption versus non-adoption of specific ethical standards occurs—that is, causal conditions leading to rejection are not the mirror opposites of causal conditions leading to adoption

    On Trust Establishment in Mobile Ad-Hoc Networks

    Get PDF
    We present some properties of trust establishment in mobile, ad-hocnetworks and illustrate how they differ from those of trustestablishment in the Internet. We motivate these differences byproviding an example of ad-hoc network use in battlefield scenarios,yet equally practical examples can be found in non-militaryenvironments. We present a framework for trust establishment inmobile ad-hoc networks and argue that peer-to-peer networks areespecially suitable to solve the problems of generation, distribution,and discovery of trust evidence in mobile ad-hoc networks. We evaluateour approach through simulation with NS-2

    Automated Structural-level Alignment of Multi-view TLS and ALS Point Clouds in Forestry

    Full text link
    Access to highly detailed models of heterogeneous forests from the near surface to above the tree canopy at varying scales is of increasing demand as it enables more advanced computational tools for analysis, planning, and ecosystem management. LiDAR sensors available through different scanning platforms including terrestrial, mobile and aerial have become established as one of the primary technologies for forest mapping due to their inherited capability to collect direct, precise and rapid 3D information of a scene. However, their scalability to large forest areas is highly dependent upon use of effective and efficient methods of co-registration of multiple scan sources. Surprisingly, work in forestry in GPS denied areas has mostly resorted to methods of co-registration that use reference based targets (e.g., reflective, marked trees), a process far from scalable in practice. In this work, we propose an effective, targetless and fully automatic method based on an incremental co-registration strategy matching and grouping points according to levels of structural complexity. Empirical evidence shows the method's effectiveness in aligning both TLS-to-TLS and TLS-to-ALS scans under a variety of ecosystem conditions including pre/post fire treatment effects, of interest to forest inventory surveyors

    A Programming Environment Evaluation Methodology for Object-Oriented Systems

    Get PDF
    The object-oriented design strategy as both a problem decomposition and system development paradigm has made impressive inroads into the various areas of the computing sciences. Substantial development productivity improvements have been demonstrated in areas ranging from artificial intelligence to user interface design. However, there has been very little progress in the formal characterization of these productivity improvements and in the identification of the underlying cognitive mechanisms. The development and validation of models and metrics of this sort require large amounts of systematically-gathered structural and productivity data. There has, however, been a notable lack of systematically-gathered information on these development environments. A large part of this problem is attributable to the lack of a systematic programming environment evaluation methodology that is appropriate to the evaluation of object-oriented systems
    • …
    corecore