2,898 research outputs found

    Slicing of Concurrent Programs and its Application to Information Flow Control

    Get PDF
    This thesis presents a practical technique for information flow control for concurrent programs with threads and shared-memory communication. The technique guarantees confidentiality of information with respect to a reasonable attacker model and utilizes program dependence graphs (PDGs), a language-independent representation of information flow in a program

    Multi-level Contextual Type Theory

    Full text link
    Contextual type theory distinguishes between bound variables and meta-variables to write potentially incomplete terms in the presence of binders. It has found good use as a framework for concise explanations of higher-order unification, characterize holes in proofs, and in developing a foundation for programming with higher-order abstract syntax, as embodied by the programming and reasoning environment Beluga. However, to reason about these applications, we need to introduce meta^2-variables to characterize the dependency on meta-variables and bound variables. In other words, we must go beyond a two-level system granting only bound variables and meta-variables. In this paper we generalize contextual type theory to n levels for arbitrary n, so as to obtain a formal system offering bound variables, meta-variables and so on all the way to meta^n-variables. We obtain a uniform account by collapsing all these different kinds of variables into a single notion of variabe indexed by some level k. We give a decidable bi-directional type system which characterizes beta-eta-normal forms together with a generalized substitution operation.Comment: In Proceedings LFMTP 2011, arXiv:1110.668

    KONZO : the IBRO Africa Regional Committee (ARC) organizes its first Global Advocacy Workshop for Neuroscience in Kinshasa

    Get PDF
    Neurological diseases such as epilepsy, konzo, or neurolathyrism are not well understood or even accepted as major causes of disability. It is important that the public – from parents and children to politicians and policymakers – be informed about the importance of brain research and how it can help understand the causes and develop cures or, at least, alleviate the symptoms of neurological diseases

    Using JOANA for Information Flow Control in Java Programs - A Practical Guide

    Get PDF

    Many-Task Computing and Blue Waters

    Full text link
    This report discusses many-task computing (MTC) generically and in the context of the proposed Blue Waters systems, which is planned to be the largest NSF-funded supercomputer when it begins production use in 2012. The aim of this report is to inform the BW project about MTC, including understanding aspects of MTC applications that can be used to characterize the domain and understanding the implications of these aspects to middleware and policies. Many MTC applications do not neatly fit the stereotypes of high-performance computing (HPC) or high-throughput computing (HTC) applications. Like HTC applications, by definition MTC applications are structured as graphs of discrete tasks, with explicit input and output dependencies forming the graph edges. However, MTC applications have significant features that distinguish them from typical HTC applications. In particular, different engineering constraints for hardware and software must be met in order to support these applications. HTC applications have traditionally run on platforms such as grids and clusters, through either workflow systems or parallel programming systems. MTC applications, in contrast, will often demand a short time to solution, may be communication intensive or data intensive, and may comprise very short tasks. Therefore, hardware and software for MTC must be engineered to support the additional communication and I/O and must minimize task dispatch overheads. The hardware of large-scale HPC systems, with its high degree of parallelism and support for intensive communication, is well suited for MTC applications. However, HPC systems often lack a dynamic resource-provisioning feature, are not ideal for task communication via the file system, and have an I/O system that is not optimized for MTC-style applications. Hence, additional software support is likely to be required to gain full benefit from the HPC hardware

    An Analysis of the Current Program Slicing and Algorithmic Debugging Based Techniques

    Full text link
    This thesis presents a classification of program slicing based techniques. The classification allows us to identify the differences between existing techniques, but it also allows us to predict new slicing techniques. The study identifies and compares the dimensions that influence current techniques.Silva Galiana, JF. (2008). An Analysis of the Current Program Slicing and Algorithmic Debugging Based Techniques. http://hdl.handle.net/10251/14300Archivo delegad

    Validity and usability of a virtual reality intraocular surgical simulator

    Get PDF
    Cataract surgery is one of the most common surgical procedures in Sweden and around 90 000 operations are made each year. An aging population with increased demands on quality of life and good visual acuity, has led to an increased rate of surgery and more surgeons needs to be trained. Training of new cataract surgeons is done on scarce wet-lab training but mainly on patients. Training is costly and complications are higher for new surgeons compared to experienced ones. In the airline industry simulators are used for training. Pilots have to prove competent before flying a new airplane. No such standards exist for new cataract surgeons. Surgical simulators have been used in other surgical fields for training and reports have shown that training has improved performance on real operations. The purpose of this work was to validate Eyesi, a surgical simulator for cataract surgery training, and analyze learning curves. Furthermore we set out to investigate whether factors like stereoacuity and sex would be important for performance in the simulator. Evidence for construct validity was found for cataract specific modules capsulorhexis, hydromaneuvers and phaco divide and conquer and for manipulating modules cataract navigation training, cataract forceps training and cataract cracking and chopping training. Analysis of learning curves showed significant improvement throughout training. Evidence for concurrent validity was established for the capsulorhexis module. For the hydromaneuvers and phaco modules, the innate simulator scoring could not distinguish surgical skill but discrimination was dependent on video based human scoring. Stereoacuity was found to correlate with performance on the simulator but there were large individual variations. An individual’s sex had no influence on performance. We have shown that Eyesi can differentiate cataract surgical skill and that naïve can train in the simulator and improve. Stereoacuity has an effect on performance but there were large individual variations. Simulation-based training has the potential to move the early learning curve out of the operating room

    Model Checking with Program Slicing Based on Variable Dependence Graphs

    Full text link
    In embedded control systems, the potential risks of software defects have been increasing because of software complexity which leads to, for example, timing related problems. These defects are rarely found by tests or simulations. To detect such defects, we propose a modeling method which can generate software models for model checking with a program slicing technique based on a variable dependence graph. We have applied the proposed method to one case in automotive control software and demonstrated the effectiveness of the method. Furthermore, we developed a software tool to automate model generation and achieved a 35% decrease in total verification time on model checking.Comment: In Proceedings FTSCS 2012, arXiv:1212.657
    • …
    corecore