313,357 research outputs found

    Partial Orders for Efficient BMC of Concurrent Software

    Get PDF
    This version previously deposited at arXiv:1301.1629v1 [cs.LO]The vast number of interleavings that a concurrent program can have is typically identified as the root cause of the difficulty of automatic analysis of concurrent software. Weak memory is generally believed to make this problem even harder. We address both issues by modelling programs' executions with partial orders rather than the interleaving semantics (SC). We implemented a software analysis tool based on these ideas. It scales to programs of sufficient size to achieve first-time formal verification of non-trivial concurrent systems code over a wide range of models, including SC, Intel x86 and IBM Power

    Proof in dynamic geometry contexts

    No full text
    Proof lies at the heart of mathematics yet we know from research in mathematics education that proof is an elusive concept for many mathematics students. The question that this paper raises is whether the introduction of dynamic geometry software will improve the situation – or whether it make the transition from informal to formal proof in mathematics even harder. Through discussion of research into innovative teaching approaches with computers the paper examines whether such approaches can assist pupils in developing a conceptual framework for proof, and in appropriating proof as a means to illuminate geometrical ideas

    Professional, easy to use and robust bioinformatic tools

    Get PDF
    To make use of Big Data software tools and computer analytics are essential. However, academic software has a bad reputation: hard to read, even harder to understand and impossible to maintain. In addition, it often does not scale up, so when faced with data sets that are increasing rapidly in size and ..

    Robust Software

    Get PDF
    Agents offer a convenient level of granularity at which to add redundancy a key factor in developing robust software. Blindly adding code introduces more errors, makes the system more complex, and renders it harder to understand. However, adding more code can make software better, if it is added in the right way. As this article describes, the key concepts appear to be redundancy and the appropriate granularity

    Open policy for wireless computers in classrooms: What makes it a good or a bad idea?

    Get PDF
    Increasingly, studies and media articles have been looking into possible adverse effects of open policies for using wireless ready computers in classrooms. Tablet PCs, as indicated by some of those authors, are under suspicion more than laptops because they make it harder for instructor to determine whether they are used productively or for off-the-task purposes. In this study students were invited to voluntarily bring their personal wireless computers to introductory physics classes in order to utilize them with DyKnow software. We compare performance of students who consistently used computers in classroom with those who did so less frequently or not at all. We also gauge how student attitudes and recommendations related to DyKnow software and Tablet PCs vary by the type of computer that was available to them in this course

    Open policy for wireless computers in classrooms: What makes it a good or a bad idea?

    Get PDF
    Increasingly, studies and media articles have been looking into possible adverse effects of open policies for using wireless ready computers in classrooms. Tablet PCs, as indicated by some of those authors, are under suspicion more than laptops because they make it harder for instructor to determine whether they are used productively or for off-the-task purposes. In this study students were invited to voluntarily bring their personal wireless computers to introductory physics classes in order to utilize them with DyKnow software. We compare performance of students who consistently used computers in classroom with those who did so less frequently or not at all. We also gauge how student attitudes and recommendations related to DyKnow software and Tablet PCs vary by the type of computer that was available to them in this course

    Steganografi Pada File Audio WAV Untuk Pengamanan Data Teks Menggunakan Metode Least Significant Bit (LSB)

    Get PDF
    One of hot problem when send message is security. Many unauthenticated people use many technique and method to trying to stole information. With the development of science and technology, now have many technique what we can use from past until now, such as cryptography and steganography. Steganography is a science which can use to security of data, so people can’t know that’s data. LSB (Least Significant Bit) is one algorithm from steganography. LSB algorithm can insert messages to many cover,such as picture, sound, and text. Method which using by LSB algorithm is manipulated last bit. One of cover which we can use is WAV audio. This software made to secure data text to audio WAV using LSB algorithm, and using PRNG (Pseudo Random Number Generator) as randomization method, to make harder . This software build using Waterfall Model of software development. This result of development this software has been able to insert and disclosure message in the form of text into a WAV audio using LSB-PRNG algorithm

    The Tory Anarchism of F/OSS Licensing

    Get PDF
    This Article uses the example of free and open-source software licenses to show that granting authors relatively strong control over the modification of their work can increase rather than impede both the creation of future work and the variety of that work. Such licenses show that form agreements that enable authors to condition use of their work on the terms that matter most to them may give authors the incentive and assurance they need to produce work and make it available to others. Such licenses may therefore increase both the amount of expression available for use and the variety of that expression, even if enforcement limits the freedom of downstream users. These facts give reason to oppose recent decisions that make license terms harder to enforce through preliminary or permanent injunctive relief

    Linux Malware Obfuscation

    Get PDF
    Many forms of malicious software use techniques and tools that make it harder for their functionality to be parsed, both by antivirus software and reverse-engineering methods. Historically, the vast majority of malware has been written for the Windows operating system due to its large user base. As such, most efforts made for malware detection and analysis have been performed on that platform. However, in recent years, we have seen an increase in malware targeting servers running Linux and other Unix-like operating systems resulting in more emphasis of malware research on these platforms. In this work, several obfuscation techniques for Linux malware were analyzed. The goal of this thesis is to examine how they operate, how they differ from Windows obfuscation techniques, and their effectiveness in obstructing analysis, including some methods for analysts to circumvent them
    corecore