471 research outputs found

    Search-based amorphous slicing

    Get PDF
    Amorphous slicing is an automated source code extraction technique with applications in many areas of software engineering, including comprehension, reuse, testing and reverse engineering. Algorithms for syntax-preserving slicing are well established, but amorphous slicing is harder because it requires arbitrary transformation; finding good general purpose amorphous slicing algorithms therefore remains as hard as general program transformation. In this paper we show how amorphous slices can be computed using search techniques. The paper presents results from a set of experiments designed to explore the application of genetic algorithms, hill climbing, random search and systematic search to a set of six subject programs. As a benchmark, the results are compared to those from an existing analytical algorithm for amorphous slicing, which was written specifically to perform well with the sorts of program under consideration. The results, while tentative at this stage, do give grounds for optimism. The search techniques proved able to reduce the size of the programs under consideration in all cases, sometimes equaling the performance of the specifically-tailored analytic algorithm. In one case, the search techniques performed better, highlighting a fault in the existing algorith

    Kompren: Modeling and Generating Model Slicers

    Get PDF
    International audienc

    Audits and inspections are never enough: a critique to enhance food safety

    Get PDF
    Internal and external food safety audits are conducted to assess the safety and quality of food including on-farm production, manufacturing practices, sanitation, and hygiene. Some auditors are direct stakeholders that are employed by food establishments to conduct internal audits, while other auditors may represent the interests of a second party purchaser or a third-party auditing agency. Some buyers conduct their own audits or additional testing, while some buyers trust the results of third-party audits or inspections. Third-party auditors, however, use various food safety audit standards and most do not have a vested interest in the products being sold. Audits are conducted under a proprietary standard, while food safety inspections are generally conducted within a legal framework. There have been many foodborne illness outbreaks linked to food processors that have passed third-party audits and inspections, raising questions about the utility of both. Supporters argue third-party audits are a way to ensure food safety in an era of dwindling economic resources. Critics contend that while external audits and inspections can be a valuable tool to help ensure safe food, such activities represent only a snapshot in time. This paper identifies limitations of food safety inspections and audits and provides recommendations for strengthening the system, based on developing a strong food safety culture, including risk-based verification steps, throughout the food safety system

    A clumpy and anisotropic galaxy halo at z=1 from gravitational-arc tomography

    Full text link
    Every star-forming galaxy has a halo of metal-enriched gas extending out to at least 100 kpc, as revealed by the absorption lines this gas imprints on the spectra of background quasars. However, quasars are sparse and typically probe only one narrow pencil beam through the intervening galaxy. Close quasar pairs and gravitationally lensed quasars have been used to circumvent this inherently one-dimensional technique, but these objects are rare and the structure of the circum-galactic medium remains poorly constrained. As a result, our understanding of the physical processes that drive the re-cycling of baryons across the lifetime of a galaxy is limited. Here we report integral-field (tomographic) spectroscopy of an extended background source -a bright giant gravitational arc. We can thus coherently map the spatial and kinematic distribution of Mg II absorption -a standard tracer of enriched gas- in an intervening galaxy system at redshift 0.98 (i.e., ~8 Gyr ago). Our gravitational-arc tomography unveils a clumpy medium in which the absorption-strength decreases with increasing impact parameter, in good agreement with the statistics towards quasars; furthermore, we find strong evidence that the gas is not distributed isotropically. Interestingly, we detect little kinematic variation over a projected area of ~600 kpc squared, with all line-of-sight velocities confined to within a few tens of km/s of each other. These results suggest that the detected absorption originates from entrained recycled material, rather than in a galactic outflow.Comment: Published online in Nature on 31 January 201

    The Elimination of Listeria monocytogenes Biofilms from Stainless Steel Deli Meat Slicer Components by the use of Hurdle Technologies

    Get PDF
    Listeria monocytogenes growth is of the greatest concern amongst ready-to-eat foods. The United States Department of Agriculture\u27s Food Safety and Inspection Services determined that deli luncheon meats pose the greatest risk of contamination from L. monocytogenes Industrial meat slicers have many removable parts that are connected with sealers and gaskets, which can become worn over time. These spaces cannot be cleaned adequately, therefore are susceptible to bacterial growth. Planktonic cells form biofilms in order to protect the cell from adverse conditions, like during routine cleaning and sanitation. Once a biofilm is formed, the bacteria are much more difficult to eradicate and can be more resistant to the lethal effects of chlorine. This study analyzed the biofilm forming abilities of different L. monocytogenes serotypes and L. innocua by observation through motility tests, microtiter plate biofilm assay and microscopy. Listeria strains were grown on stainless steel coupons cut from a deli meat slicer blade in order the observe biofilm growth. This study also investigated the synergistic effects of steam and chemical sanitizers on disrupting and removing the biofilms formed on the stainless steel coupons. Both flagellated and non-flagellated Listeria strains produced biofilms and there was no correlation observed between the production of biofilms and hydrophobicity if the films. Overall there was a 5 to 7 log reduction between the combined treatments and the initial inoculation. The sanitizer alone gave a 2 to 3 log reduction and the steam treatment resulted in a 3 to 4 log reduction. The results of this study will provide better understanding of and potential methods for the sanitization of deli meat slicers. In turn, the knowledge gained from this study will reduce the risk of contamination and outbreaks of L. monocytogenes and other food-borne pathogens

    Executables from Program Slices for Java Programs

    Get PDF
    Program slicing is a popular program decomposition and analysis technique that extracts only those program statements that are relevant to particular points of interest. Executable slices are program slices that are independently executable and that correctly compute the values in the slicing criteria. Executable slices can be used during debugging and to improve program performance through paral- lelization of partially overlapping slices. While program slicing and the construction of executable slicers has been stud- ied in the past, there are few acceptable executable slicers available, even for pop- ular languages such as Java. In this work, we provide an extension to the T. J. Watson Libraries for Analysis (WALA), an open-source Java application static analysis suite, to generate fully executable slices. We analyze the problem of executable slice generation in the context of the capabilities provided and algorithms used by the WALA library. We then employ this understanding to augment the existing WALA static SSA slicer to efficiently track non-SSA data dependence, and couple this component with our executable slicer backend. We evaluate our slicer extension and find that it produces accurate executable slices for all programs that fall within the limitations of the WALA SSA slicer itself. Our extension to generate executable program slices facilitates one of the requirements of our larger project for a Java application automatic partitioner and parallelizer

    NeuroTerrain – a client-server system for browsing 3D biomedical image data sets

    Get PDF
    BACKGROUND: Three dimensional biomedical image sets are becoming ubiquitous, along with the canonical atlases providing the necessary spatial context for analysis. To make full use of these 3D image sets, one must be able to present views for 2D display, either surface renderings or 2D cross-sections through the data. Typical display software is limited to presentations along one of the three orthogonal anatomical axes (coronal, horizontal, or sagittal). However, data sets precisely oriented along the major axes are rare. To make fullest use of these datasets, one must reasonably match the atlas' orientation; this involves resampling the atlas in planes matched to the data set. Traditionally, this requires the atlas and browser reside on the user's desktop; unfortunately, in addition to being monolithic programs, these tools often require substantial local resources. In this article, we describe a network-capable, client-server framework to slice and visualize 3D atlases at off-axis angles, along with an open client architecture and development kit to support integration into complex data analysis environments. RESULTS: Here we describe the basic architecture of a client-server 3D visualization system, consisting of a thin Java client built on a development kit, and a computationally robust, high-performance server written in ANSI C++. The Java client components (NetOStat) support arbitrary-angle viewing and run on readily available desktop computers running Mac OS X, Windows XP, or Linux as a downloadable Java Application. Using the NeuroTerrain Software Development Kit (NT-SDK), sophisticated atlas browsing can be added to any Java-compatible application requiring as little as 50 lines of Java glue code, thus making it eminently re-useable and much more accessible to programmers building more complex, biomedical data analysis tools. The NT-SDK separates the interactive GUI components from the server control and monitoring, so as to support development of non-interactive applications. The server implementation takes full advantage of data center's high-performance hardware, where it can be co-localized with centrally-located, 3D dataset repositories, extending access to the researcher community throughout the Internet. CONCLUSION: The combination of an optimized server and modular, platform-independent client provides an ideal environment for viewing complex 3D biomedical datasets, taking full advantage of high-performance servers to prepare images and subsets of associated meta-data for viewing, as well as the graphical capabilities in Java to actually display the data

    Software quality tools and techniques presented in FASE’17

    Get PDF
    Software quality assurance aims to ensure that the software product meets the quality standards expected by the customer. This special issue of Software Tools for Technology Transfer is concerned with the foundations on which software quality assurance is built. It introduces the papers that focus on this topic and that have been selected from the 20th International Conference on Fundamental Approaches to Software Engineering (FASE’17)

    Dynamic Slicing by On-demand Re-execution

    Full text link
    In this paper, we propose a novel approach that aims to offer an alternative to the prevalent paradigm to dynamic slicing construction. Dynamic slicing requires dynamic data and control dependencies that arise in an execution. During a single execution, memory reference information is recorded and then traversed to extract dependencies. Execute-once approaches and tools are challenged even by executions of moderate size of simple and short programs. We propose to shift practical time complexity from execution size to slice size. In particular, our approach executes the program multiple times while tracking targeted information at each execution. We present a concrete algorithm that follows an on-demand re-execution paradigm that uses a novel concept of frontier dependency to incrementally build a dynamic slice. To focus dependency tracking, the algorithm relies on static analysis. We show results of an evaluation on the SV-COMP benchmark and Antrl4 unit tests that provide evidence that on-demand re-execution can provide performance gains particularly when slice size is small and execution size is large
    • 

    corecore