6,809 research outputs found

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    Towards A Practical High-Assurance Systems Programming Language

    Full text link
    Writing correct and performant low-level systems code is a notoriously demanding job, even for experienced developers. To make the matter worse, formally reasoning about their correctness properties introduces yet another level of complexity to the task. It requires considerable expertise in both systems programming and formal verification. The development can be extremely costly due to the sheer complexity of the systems and the nuances in them, if not assisted with appropriate tools that provide abstraction and automation. Cogent is designed to alleviate the burden on developers when writing and verifying systems code. It is a high-level functional language with a certifying compiler, which automatically proves the correctness of the compiled code and also provides a purely functional abstraction of the low-level program to the developer. Equational reasoning techniques can then be used to prove functional correctness properties of the program on top of this abstract semantics, which is notably less laborious than directly verifying the C code. To make Cogent a more approachable and effective tool for developing real-world systems, we further strengthen the framework by extending the core language and its ecosystem. Specifically, we enrich the language to allow users to control the memory representation of algebraic data types, while retaining the automatic proof with a data layout refinement calculus. We repurpose existing tools in a novel way and develop an intuitive foreign function interface, which provides users a seamless experience when using Cogent in conjunction with native C. We augment the Cogent ecosystem with a property-based testing framework, which helps developers better understand the impact formal verification has on their programs and enables a progressive approach to producing high-assurance systems. Finally we explore refinement type systems, which we plan to incorporate into Cogent for more expressiveness and better integration of systems programmers with the verification process

    Boundary Spanner Corruption in Business Relationships

    Get PDF
    Boundary spanner corruption—voluntary collaborative behaviour between individuals representing different organisations that violates their organisations’ norms—is a serious problem in business relationships. Drawing on insights from the literatures on general corruption perspectives, the dark side of business relationships and deviance in sales and service organisations, this dissertation identifies boundary spanner corruption as a potential dark side complication inherent in close business relationships It builds research questions from these literature streams and proposes a research structure based upon commonly used methods in corruption research to address this new concept. In the first study, using an exploratory survey of boundary spanner practitioners, the dissertation finds that the nature of boundary spanner corruption is broad and encompasses severe and non-severe types. The survey also finds that these deviance types are prevalent in a widespread of geographies and industries. This prevalence is particularly noticeable for less-severe corruption types, which may be an under-researched phenomenon in general corruption research. The consequences of boundary spanner corruption can be serious for both individuals and organisations. Indeed, even less-severe types can generate long-term negative consequences. A second interview-based study found that multi-level trust factors could also motivate the emergence of boundary spanner corruption. This was integrated into a theoretical model that illustrates how trust at the interpersonal, intraorganisational, and interorganisational levels enables corrupt behaviours by allowing deviance-inducing factors stemming from the task environment or from the individual boundary spanner to manifest in boundary spanner corruption. Interpersonal trust between representatives of different organisations, interorganisational trust between these organisations, and intraorganisational agency trust of management in their representatives foster the development of a boundary-spanning social cocoon—a mechanism that can inculcate deviant norms leading to corrupt behaviour. This conceptualisation and model of boundary spanner corruption highlights intriguing directions for future research to support practitioners engaged in a difficult problem in business relationships

    2023-2024 Boise State University Undergraduate Catalog

    Get PDF
    This catalog is primarily for and directed at students. However, it serves many audiences, such as high school counselors, academic advisors, and the public. In this catalog you will find an overview of Boise State University and information on admission, registration, grades, tuition and fees, financial aid, housing, student services, and other important policies and procedures. However, most of this catalog is devoted to describing the various programs and courses offered at Boise State

    Evaluating footwear “in the wild”: Examining wrap and lace trail shoe closures during trail running

    Get PDF
    Trail running participation has grown over the last two decades. As a result, there have been an increasing number of studies examining the sport. Despite these increases, there is a lack of understanding regarding the effects of footwear on trail running biomechanics in ecologically valid conditions. The purpose of our study was to evaluate how a Wrap vs. Lace closure (on the same shoe) impacts running biomechanics on a trail. Thirty subjects ran a trail loop in each shoe while wearing a global positioning system (GPS) watch, heart rate monitor, inertial measurement units (IMUs), and plantar pressure insoles. The Wrap closure reduced peak foot eversion velocity (measured via IMU), which has been associated with fit. The Wrap closure also increased heel contact area, which is also associated with fit. This increase may be associated with the subjective preference for the Wrap. Lastly, runners had a small but significant increase in running speed in the Wrap shoe with no differences in heart rate nor subjective exertion. In total, the Wrap closure fit better than the Lace closure on a variety of terrain. This study demonstrates the feasibility of detecting meaningful biomechanical differences between footwear features in the wild using statistical tools and study design. Evaluating footwear in ecologically valid environments often creates additional variance in the data. This variance should not be treated as noise; instead, it is critical to capture this additional variance and challenges of ecologically valid terrain if we hope to use biomechanics to impact the development of new products

    Impact and Mitigation of Cyberattacks on IoT devices: A Lens on Smart Home

    Get PDF
    This Master's thesis, undertaken at the University of Turku in conjunction with an internship at Alten France, delves into the escalating issue of cyberattacks on IoT devices. This burgeoning area has begun to permeate various sectors of society, most notably through consumer products in smart homes. The primary motivations behind this chosen topic are the increased prevalence of IoT devices in our everyday lives and the corresponding surge in cyber threats, alongside the topic's real-world applicability to my work at Alten France, which is heavily invested in digital technology and innovation. The thesis begins with a comprehensive exploration of the current landscape of IoT cyber threats, including various attack vectors and their impact on different types of IoT devices. The challenges of securing IoT devices are then examined, highlighting the limitations and vulnerabilities of the IoT infrastructure. The research analyzes the impacts of cyberattacks on individual users, organizations, and society at large. It covers a wide range of consequences, such as privacy violations, financial losses, disruptions to critical infrastructure, and effects such as eroded trust in digital systems. The latter segment of the thesis addresses potential solutions and preventive measures to mitigate these impacts. The research does not aim to propose new strategies but seeks to inform future mitigation efforts based on its thorough analysis. On the whole, this thesis presents a meticulous and extensive examination of the impacts of cyberattacks on IoT devices, with an emphasis on smart homes. It underscores the urgent requirement for bolstered cybersecurity measures in our increasingly interconnected world, highlighting the severe repercussions of neglecting this need. By deepening the understanding of the extensive impacts of these cyberattacks, this research contributes valuable insights to academic discussions and supplies essential information for policymakers and industry professionals to develop more secure and resilient IoT systems

    Secure Communications in Next Generation Digital Aeronautical Datalinks

    Get PDF
    As of 2022, Air Traffic Management (ATM) is gradually digitizing to automate and secure data transmission in civil aviation. New digital data links like the L-band Digital Aeronautical Communications System (LDACS) are being introduced for this purpose. LDACS is a cellular, ground-based digital communications system for flight guidance and safety. Unfortunately, LDACS and many other datalinks in civil aviation lack link layer security measures. This doctoral thesis proposes a cybersecurity architecture for LDACS, developing various security measures to protect user and control data. These include two new authentication and key establishment protocols, along with a novel approach to secure control data of resource-constrained wireless communication systems. Evaluations demonstrate a latency increase of 570 to 620 milliseconds when securely attaching an aircraft to an LDACS cell, along with a 5% to 10% security data overhead. Also, flight trials confirm that Ground-based Augmentation System (GBAS) can be securely transmitted via LDACS with over 99% availability. These security solutions enable future aeronautical applications like 4D-Trajectories, paving the way for a digitized and automated future of civil aviation

    Digital 3D reconstruction as a research environment in art and architecture history: uncertainty classification and visualisation

    Get PDF
    The dissertation addresses the still not solved challenges concerned with the source-based digital 3D reconstruction, visualisation and documentation in the domain of archaeology, art and architecture history. The emerging BIM methodology and the exchange data format IFC are changing the way of collaboration, visualisation and documentation in the planning, construction and facility management process. The introduction and development of the Semantic Web (Web 3.0), spreading the idea of structured, formalised and linked data, offers semantically enriched human- and machine-readable data. In contrast to civil engineering and cultural heritage, academic object-oriented disciplines, like archaeology, art and architecture history, are acting as outside spectators. Since the 1990s, it has been argued that a 3D model is not likely to be considered a scientific reconstruction unless it is grounded on accurate documentation and visualisation. However, these standards are still missing and the validation of the outcomes is not fulfilled. Meanwhile, the digital research data remain ephemeral and continue to fill the growing digital cemeteries. This study focuses, therefore, on the evaluation of the source-based digital 3D reconstructions and, especially, on uncertainty assessment in the case of hypothetical reconstructions of destroyed or never built artefacts according to scientific principles, making the models shareable and reusable by a potentially wide audience. The work initially focuses on terminology and on the definition of a workflow especially related to the classification and visualisation of uncertainty. The workflow is then applied to specific cases of 3D models uploaded to the DFG repository of the AI Mainz. In this way, the available methods of documenting, visualising and communicating uncertainty are analysed. In the end, this process will lead to a validation or a correction of the workflow and the initial assumptions, but also (dealing with different hypotheses) to a better definition of the levels of uncertainty

    Mainstreaming of Nature-Based Solutions for the mitigation of hydro-meteorological hazard: governance analysis of a socio- technical change

    Get PDF
    The Nature-Based Solutions (NBS) concept and approach were developed to simultaneously face challenges such as risk mitigation and biodiversity conservation and restoration. NBSs have been endorsed by major International Organizations such as the EU, the FAO and World Bank that are pushing to enable a mainstreaming process. However, a shift from traditional engineering “grey” solutions to wider and standard adoption of NBS encounters technical, social, cultural, and normative barriers that have been identified with a qualitative content analysis of policy documents, reports and expert interviews. The case of the region Emilia-Romagna was studied by developing an analytical framework that brought together the social-ecological context, the governance system and the characteristics of specific NBSs
    • …
    corecore