711 research outputs found
A new Manifestation of Atomic Parity Violation in Cesium: a Chiral Optical Gain induced by linearly polarized 6S-7S Excitation
We have detected, by using stimulated emission, an Atomic Parity Violation
(APV) in the form of a chiral optical gain of a cesium vapor on the 7S -
6P transition,consecutive to linearly polarized 6S-7S excitation. We
demonstrate the validity of this detection method of APV, by presenting a 9%
accurate measurement of expected sign and magnitude. We underline several
advantages of this entirely new approach in which the cylindrical symmetry of
the set-up can be fully exploited. Future measurements at the percent level
will provide an important cross-check of an existing more precise result
obtained by a different method.Comment: 4 pages, 2 figure
Atomic Parity Violation : Principles, Recent Results, Present Motivations
We review the progress made in the determination of the weak charge, Q\_w, of
the cesium nucleus which raises the status of Atomic Parity Violation
measurements to that of a precision electroweak test. Not only is it necessary
to have a precision measurement of the electroweak asymmetry in the highly
forbidden 6S-7S transition, but one also needs a precise calibration procedure.
The 1999 precision measurement by the Boulder group implied a 2.5 sigma
deviation of Q\_w from the theoretical prediction. This triggered many particle
physicist suggestions as well as examination by atomic theoretical physicists
of several sources of corrections. After about three years the disagreement was
removed without appealing to "New Physics". Concurrently, an original
experimental approach was developed in our group for more than a decade. It is
based on detection by stimulated emission with amplification of the left- right
asymmetry. We present our decisive, recent progress together with our latest
results. We emphasize the important impact for electroweak theory, of future
measurements in cesium possibly pushed to the 0.1% level. Other possible
approaches are currently explored in several atoms
Understanding, Analysis, and Handling of Software Architecture Erosion
Architecture erosion occurs when a software system's implemented architecture diverges from the intended architecture over time. Studies show erosion impacts development, maintenance, and evolution since it accumulates imperceptibly. Identifying early symptoms like architectural smells enables managing erosion through refactoring. However, research lacks comprehensive understanding of erosion, unclear which symptoms are most common, and lacks detection methods. This thesis establishes an erosion landscape, investigates symptoms, and proposes identification approaches. A mapping study covers erosion definitions, symptoms, causes, and consequences. Key findings: 1) "Architecture erosion" is the most used term, with four perspectives on definitions and respective symptom types. 2) Technical and non-technical reasons contribute to erosion, negatively impacting quality attributes. Practitioners can advocate addressing erosion to prevent failures. 3) Detection and correction approaches are categorized, with consistency and evolution-based approaches commonly mentioned.An empirical study explores practitioner perspectives through communities, surveys, and interviews. Findings reveal associated practices like code review and tools identify symptoms, while collected measures address erosion during implementation. Studying code review comments analyzes erosion in practice. One study reveals architectural violations, duplicate functionality, and cyclic dependencies are most frequent. Symptoms decreased over time, indicating increased stability. Most were addressed after review. A second study explores violation symptoms in four projects, identifying 10 categories. Refactoring and removing code address most violations, while some are disregarded.Machine learning classifiers using pre-trained word embeddings identify violation symptoms from code reviews. Key findings: 1) SVM with word2vec achieved highest performance. 2) fastText embeddings worked well. 3) 200-dimensional embeddings outperformed 100/300-dimensional. 4) Ensemble classifier improved performance. 5) Practitioners found results valuable, confirming potential.An automated recommendation system identifies qualified reviewers for violations using similarity detection on file paths and comments. Experiments show common methods perform well, outperforming a baseline approach. Sampling techniques impact recommendation performance
Real-Time Reflexion Modelling in architecture reconciliation: A multi case study
Context
Reflexion Modelling is considered one of the more successful approaches to architecture reconciliation. Empirical studies strongly suggest that professional developers involved in real-life industrial projects find the information provided by variants of this approach useful and insightful, but the degree to which it resolves architecture conformance issues is still unclear.
Objective
This paper aims to assess the level of architecture conformance achieved by professional architects using Reflexion Modelling, and to determine how the approach could be extended to improve its suitability for this task.
Method
An in vivo, multi-case-study protocol was adopted across five software systems, from four different financial services organizations. Think-aloud, video-tape and interview data from professional architects involved in Reflexion Modelling sessions were analysed qualitatively.
Results
This study showed that (at least) four months after the Reflexion Modelling sessions less than 50% of the architectural violations identified were removed. The majority of participants who did remove violations favoured changes to the architectural model rather than to the code. Participants seemed to work off two specific architectural templates, and interactively explored their architectural model to focus in on the causes of violations, and to assess the ramifications of potential code changes. They expressed a desire for dependency analysis beyond static-source-code analysis and scalable visualizations.
Conclusion
The findings support several interesting usage-in-practice traits, previously hinted at in the literature. These include (1) the iterative analysis of systems through Reflexion models, as a precursor to possible code change or as a focusing mechanism to identify the location of architecture conformance issues, (2) the extension of the approach with respect to dependency analysis of software systems and architectural modelling templates, (3) improved visualization support and (4) the insight that identification of architectural violations in itself does not lead to their removal in the majority of instances.This work was supported, in part, by Science Foundation Ireland Grants 12/IP/1351 and 10/CE/I1855 to Lero – the Irish Software Engineering Research Centre (www.lero.ie) and by the University of Brighton under the Rising Star Scheme awarded to Nour Ali
Towards Automatic Identification of Violation Symptoms of Architecture Erosion
Architecture erosion has a detrimental effect on maintenance and evolution,
as the implementation drifts away from the intended architecture. To prevent
this, development teams need to understand early enough the symptoms of
erosion, and particularly violations of the intended architecture. One way to
achieve this, is through the automatic identification of architecture
violations from textual artifacts, and particularly code reviews. In this
paper, we developed 15 machine learning-based and 4 deep learning-based
classifiers with three pre-trained word embeddings to identify violation
symptoms of architecture erosion from developer discussions in code reviews.
Specifically, we looked at code review comments from four large open-source
projects from the OpenStack (Nova and Neutron) and Qt (Qt Base and Qt Creator)
communities. We then conducted a survey to acquire feedback from the involved
participants who discussed architecture violations in code reviews, to validate
the usefulness of our trained classifiers. The results show that the SVM
classifier based on word2vec pre-trained word embedding performs the best with
an F1-score of 0.779. In most cases, classifiers with the fastText pre-trained
word embedding model can achieve relatively good performance. Furthermore,
200-dimensional pre-trained word embedding models outperform classifiers that
use 100 and 300-dimensional models. In addition, an ensemble classifier based
on the majority voting strategy can further enhance the classifier and
outperforms the individual classifiers. Finally, an online survey of the
involved developers reveals that the violation symptoms identified by our
approaches have practical value and can provide early warnings for impending
architecture erosion.Comment: 20 pages, 4 images, 7 tables, Revision submitted to TSE (2023
Preparing Software Re-Engineering via Freehand Sketches in Virtual Reality
Re-architecting a software system requires significant preparation, e.g., to scope and design new modules with their boundaries and constituent classes. When planning an intended future state of a system as a re-engineering goal, engineers often fall recur to mechanisms such as freehand sketching (using a whiteboard). While this ensures flexibility and expressiveness, the sketches remain disconnected from the source code. The alternative, tool-supported diagramming on the other hand considerably restricts flexibility and impedes free-form communication.We present a method for preparing the architectural software re-engineering via freehand sketches in virtual reality (VR) that can be seamlessly integrated with the model structure of a software visualization and, thus, also the code of a system, for productive use: Engineers explore a subject system in the immersive visualization, while freehand sketching their insights and plans. Our concept automatically interprets sketched shapes and connects them to the system’s source code, and superimposes code-level references into a sketch to support engineers in reflecting on their sketches.We evaluated our method in an iterative interview-based case study with software developers from four different companies, where they planned a hypothetical re-engineering of an opensource software system.Video Demonstration — https://youtu.be/NKC5YpH3n4
High-Energy gamma-ray Astronomy and String Theory
There have been observations, first from the MAGIC Telescope (July 2005) and
quite recently (September 2008) from the FERMI Satellite Telescope, on
non-simultaneous arrival of high-energy photons from distant celestial sources.
In each case, the highest energy photons were delayed, as compared to their
lower-energy counterparts. Although the astrophysics at the source of these
energetic photons is still not understood, and such non simultaneous arrival
might be due to non simultaneous emission as a result of conventional physics
effects, nevertheless, rather surprisingly, the observed time delays can also
fit excellently some scenarios in quantum gravity, predicting Lorentz violating
space-time "foam" backgrounds with a non-trivial subluminal vacuum refractive
index suppressed linearly by a quantum gravity scale of the order of the
reduced Planck mass. In this pedagogical talk, I discuss the MAGIC and FERMI
findings in this context and I argue on a theoretical model of space-time foam
in string/brane theory that can accommodate the findings of those experiments
in agreement with all other stringent tests of Lorentz invariance. However, I
stress the current ambiguities/uncertainties on the source mechanisms, which
need to be resolved first before definite conclusions are reached regarding
quantum gravity foam scenarios.Comment: 34 pages latex, 12 eps figures incorporated, uses special macros.
Based on invited plenary talk at DICE 2008 Conference (Castiglioncello,
Italy), September 22-26 200
- …