3,979 research outputs found

    Doctor of Philosophy in Computer Science

    Get PDF
    dissertationControl-flow analysis of higher-order languages is a difficult problem, yet an important one. It aids in enabling optimizations, improved reliability, and improved security of programs written in these languages. This dissertation explores three techniques to improve the precision and speed of a small-step abstract interpreter: using a priority work list, environment unrolling, and strong function call. In an abstract interpreter, the interpreter is no longer deterministic and choices can be made in how the abstract state space is explored and trade-offs exist. A priority queue is one option. There are also many ways to abstract the concrete interpreter. Environment unrolling gives a slightly different approach than is usually taken, by holding off abstraction in order to gain precision, which can lead to a faster analysis. Strong function call is an approach to clean up some of the imprecision when making a function call that is introduced when abstractly interpreting a program. An alternative approach to building an abstract interpreter to perform static analysis is through the use of constraint solving. Existing techniques to do this have been developed over the last several decades. This dissertation maps these constraints to three different problems, allowing control-flow analysis of higher-order languages to be solved with tools that are already mature and well developed. The control-flow problem is mapped to pointer analysis of first-order languages, SAT, and linear-algebra operations. These mappings allow for fast and parallel implementations of control-flow analysis of higher-order languages. A recent development in the field of static analysis has been pushdown control-flow analysis, which is able to precisely match calls and returns, a weakness in the existing techniques. This dissertation also provides an encoding of pushdown control-flow analysis to linear-algebra operations. In the process, it demonstrates that under certain conditions (monovariance and flow insensitivity) that in terms of precision, a pushdown control-flow analysis is in fact equivalent to a direct style constraint-based formulation

    Programming Languages and Systems

    Get PDF
    This open access book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which was planned to take place in Dublin, Ireland, in April 2020, as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The actual ETAPS 2020 meeting was postponed due to the Corona pandemic. The papers deal with fundamental issues in the specification, design, analysis, and implementation of programming languages and systems

    Transonic flow studies

    Get PDF
    Major emphasis was on the design of shock free airfoils with applications to general aviation. Unsteady flow, transonic flow, and shock wave formation were examined

    Towards optical intensity interferometry for high angular resolution stellar astrophysics

    Full text link
    Most neighboring stars are still detected as point sources and are beyond the angular resolution reach of current observatories. Methods to improve our understanding of stars at high angular resolution are investigated. Air Cherenkov telescopes (ACTs), primarily used for Gamma-ray astronomy, enable us to increase our understanding of the circumstellar environment of a particular system. When used as optical intensity interferometers, future ACT arrays will allow us to detect stars as extended objects and image their surfaces at high angular resolution. Optical stellar intensity interferometry (SII) with ACT arrays, composed of nearly 100 telescopes, will provide means to measure fundamental stellar parameters and also open the possibility of model-independent imaging. A data analysis algorithm is developed and permits the reconstruction of high angular resolution images from simulated SII data. The capabilities and limitations of future ACT arrays used for high angular resolution imaging are investigated via Monte-Carlo simulations. Simple stellar objects as well as stellar surfaces with localized hot or cool regions can be accurately imaged. Finally, experimental efforts to measure intensity correlations are expounded. The functionality of analog and digital correlators is demonstrated. Intensity correlations have been measured for a simulated star emitting pseudo-thermal light, resulting in angular diameter measurements. The StarBase observatory, consisting of a pair of 3 m telescopes separated by 23 m, is described.Comment: PhD dissertatio

    Present state of knowledge of the upper atmosphere 1988: An assessment report

    Get PDF
    This document was issued in response to the Clean Air Act Amendments of 1977, Public Law 95-95, mandating that NASA and other key agencies submit biennial reports to Congress and EPA. NASA is to report on the state of our knowledge of the upper atmosphere, particularly the stratosphere. This is the sixth ozone assessment report submitted to Congress and the concerned regulatory agencies. Part 1 contains an outline of the NASA Upper Atmosphere Research Program and summaries of the research efforts supported during the last two years. An assessment is presented of the state of knowledge as of March 15, 1988 when the Ozone Trends Panel, organized by NASA and co-sponsored by the World Meteorological Organization, NOAA, FAA and the United Nations Environment Program released an executive summary of its findings from a critical in-depth study involving over 100 scientists from 12 countries. Chapter summaries of the International Ozone Trends Panel Report form the major part of this report. Two other sections are Model Predictions of Future Ozone Change and Chemical Kinetics and Photochemical Data for Use in Stratospheric Modeling. Each of these sections and the report in its entirety were peer reviewed

    Doctor of Philosophy

    Get PDF
    dissertationToday's smartphones house private and confidential data ubiquitously. Mobile apps running on the devices can leak sensitive information by accident or intentionally. To understand application behaviors before running a program, we need to statically analyze it, tracking what data are accessed, where sensitive data ow, and what operations are performed with the data. However, automated identification of malicious behaviors in Android apps is challenging: First, there is a primary challenge in analyzing object-oriented programs precisely, soundly and efficiently, especially in the presence of exceptions. Second, there is an Android-specific challenge|asynchronous execution of multiple entry points. Third, the maliciousness of any given behavior is application-dependent and subject to human judgment. In this work, I develop a generic, highly precise static analysis of object-oriented code with multiple entry points, on which I construct an eective malware identification system with a human in the loop. Specically, I develop a new analysis-pushdown exception-ow analysis, to generalize the analysis of normal control flows and exceptional flows in object-oriented programs. To rene points-to information, I generalize abstract garbage collection to object-oriented programs and enhance it with liveness analysis for even better precision. To tackle Android-specic challenges, I develop multientry point saturation to approximate the eect of arbitrary asynchronous events. To apply the analysis techniques to security, I develop a static taint- ow analysis to track and propagate tainted sensitive data in the push-down exception-flow framework. To accelerate the speed of static analysis, I develop a compact and ecient encoding scheme, called G odel hashes, and integrate it into the analysis framework. All the techniques are realized and evaluated in a system, named AnaDroid. AnaDroid is designed with a human in the loop to specify analysis conguration, properties of interest and then to make the nal judgment and identify where the maliciousness is, based on analysis results. The analysis results include control- ow graphs highlighting suspiciousness, permission and risk-ranking reports. The experiments show that AnaDroid can lead to precise and fast identication of common classes of Android malware

    Resurgence in Supersymmetric Localisable Quantum Field Theories

    Get PDF
    In this thesis we consider the application of resurgence and Picard-Lefschetz theory to supersymmetric localisable quantum field theories in 2, 3 and 4 dimensions. We consider two problems. First, in the theories we study, observables can be calculated exactly using localization methods, and written in the form of a transseries. However in each non-perturbative sector, the associated perturbation series is not asymptotic, seemingly rendering the application of resurgence theory impossible. This problem is solved by deploying a Cheshire Cat analysis; we slightly deform the theory rendering the series asymptotic, perform a resurgence analysis in the deformed theory, and analytically continue the deformation back to 0, returning the non-perturbative data in the undeformed theories. This is achieved in N=(2,2) theories in 2 dimensions, and N=2 theories in 3 dimensions. Comments are made about how we might generalize this to 4 dimensional theories. The second problem is the disappearance of the resurgence triangle structure in N = 2 theories on a 3-sphere. This structure is recovered by means of introducing a complex squashing parameter, uncovering a hidden topological angle present in the theory. Finally, in the two above mentioned theories and N = 2 theories in 4 dimensions, a method is given for how to combine a resurgence analysis with additional nonperturbative structures present in these theories to compute non-perturbative contributions with different topological charge from the perturbative data
    corecore