103,521 research outputs found
Scheduler-specific Confidentiality for Multi-Threaded Programs and Its Logic-Based Verification
Observational determinism has been proposed in the literature as a way to ensure confidentiality for multi-threaded programs. Intuitively, a program is observationally deterministic if the behavior of the public variables is deterministic, i.e., independent of the private variables and the scheduling policy. Several formal definitions of observational determinism exist, but all of them have shortcomings; for example they accept insecure programs or they reject too many innocuous programs. Besides, the role of schedulers was ignored in all the proposed definitions. A program that is secure under one kind of scheduler might not be secure when executed with a different scheduler. The existing definitions do not ensure that an accepted program behaves securely under the scheduler that is used to deploy the program. Therefore, this paper proposes a new formalization of scheduler-specific observational determinism. It accepts programs that are secure when executed under a specific scheduler. Moreover, it is less restrictive on harmless programs under a particular scheduling policy. In addition, we discuss how compliance with our definition can be verified, using model checking. We use the idea of self-composition and we rephrase the observational determinism property for a single program as a temporal logic formula over the program executed in parallel with an independent copy of itself. Thus two states reachable during the execution of are combined into a reachable program state of the self-composed program. This allows to compare two program executions in a single temporal logic formula. The actual characterization is done in two steps. First we discuss how stuttering equivalence can be characterized as a temporal logic formula. Observational determinism is then expressed in terms of the stuttering equivalence characterization. This results in a conjunction of an LTL and a CTL formula, that are amenable to model checking
Distributed-memory parallelization of an explicit time-domain volume integral equation solver on Blue Gene/P
Two distributed-memory schemes for efficiently parallelizing the explicit marching-on in-time based solution of the time domain volume integral equation on the IBM Blue Gene/P platform are presented. In the first scheme, each processor stores the time history of all source fields and only the computationally dominant step of the tested field computations is distributed among processors. This scheme requires all-to-all global communications to update the time history of the source fields from the tested fields. In the second scheme, the source fields as well as all steps of the tested field computations are distributed among processors. This scheme requires sequential global communications to update the time history of the distributed source fields from the tested fields. Numerical results demonstrate that both schemes scale well on the IBM Blue Gene/P platform and the memory efficient second scheme allows for the characterization of transient wave interactions on composite structures discretized using three million spatial elements without an acceleration algorithm
Verification of Confidentiality of Multi-threaded Programs
An introduction of Slalom project: motivation, plans and some result
On Colorful Bin Packing Games
We consider colorful bin packing games in which selfish players control a set
of items which are to be packed into a minimum number of unit capacity bins.
Each item has one of colors and cannot be packed next to an item of
the same color. All bins have the same unitary cost which is shared among the
items it contains, so that players are interested in selecting a bin of minimum
shared cost. We adopt two standard cost sharing functions: the egalitarian cost
function which equally shares the cost of a bin among the items it contains,
and the proportional cost function which shares the cost of a bin among the
items it contains proportionally to their sizes. Although, under both cost
functions, colorful bin packing games do not converge in general to a (pure)
Nash equilibrium, we show that Nash equilibria are guaranteed to exist and we
design an algorithm for computing a Nash equilibrium whose running time is
polynomial under the egalitarian cost function and pseudo-polynomial for a
constant number of colors under the proportional one. We also provide a
complete characterization of the efficiency of Nash equilibria under both cost
functions for general games, by showing that the prices of anarchy and
stability are unbounded when while they are equal to 3 for black and
white games, where . We finally focus on games with uniform sizes (i.e.,
all items have the same size) for which the two cost functions coincide. We
show again a tight characterization of the efficiency of Nash equilibria and
design an algorithm which returns Nash equilibria with best achievable
performance
Challenges in Bridging Social Semantics and Formal Semantics on the Web
This paper describes several results of Wimmics, a research lab which names
stands for: web-instrumented man-machine interactions, communities, and
semantics. The approaches introduced here rely on graph-oriented knowledge
representation, reasoning and operationalization to model and support actors,
actions and interactions in web-based epistemic communities. The re-search
results are applied to support and foster interactions in online communities
and manage their resources
- …