33 research outputs found
LIPIcs, Volume 261, ICALP 2023, Complete Volume
LIPIcs, Volume 261, ICALP 2023, Complete Volum
An exploration of the impact of corruption on service delivery in the Emfuleni Local Municipality, Gauteng
This study was conducted as a result of the various media reports and complaints from the Emfuleni Local Municipality residents on the impact of corruption on service delivery in the Emfuleni local municipality. The municipality does not have any strategy to fight corruption and it only relies on the South African Police Service (SAPS) to investigate internal crimes. A qualitative research approach was used to investigate this problem. A thorough literature study and documentary analysis were used to gather the relevant data related to this topic.Criminology and Security ScienceM.A. (Forensic Science and Technology
Genres of Listening
Xochitl Marsilli-Vargas explains how psychoanalytic listening practices have expanded beyond the clinical setting to influence everyday social interactions in Buenos Aires
Dualities in modal logic
Categorical dualities are an important tool in the study of (modal) logics. They offer conceptual understanding and enable the transfer of results between the different semantics of a logic. As such, they play a central role in the proofs of completeness theorems, Sahlqvist theorems and Goldblatt-Thomason theorems. A common way to obtain dualities is by extending existing ones. For example, Jonsson-Tarski duality is an extension of Stone duality. A convenient formalism to carry out such extensions is given by the dual categorical notions of algebras and coalgebras. Intuitively, these allow one to isolate the new part of a duality from the existing part. In this thesis we will derive both existing and new dualities via this route, and we show how to use the dualities to investigate logics. However, not all (modal logical) paradigms fit the (co)algebraic perspective. In particular, modal intuitionistic logics do not enjoy a coalgebraic treatment, and there is a general lack of duality results for them. To remedy this, we use a generalisation of both algebras and coalgebras called dialgebras. Guided by the research field of coalgebraic logic, we introduce the framework of dialgebraic logic. We show how a large class of modal intuitionistic logics can be modelled as dialgebraic logics and we prove dualities for them. We use the dialgebraic framework to prove general completeness, Hennessy-Milner, representation and Goldblatt-Thomason theorems, and instantiate this to a wide variety of modal intuitionistic logics. Additionally, we use the dialgebraic perspective to investigate modal extensions of the meet-implication fragment of intuitionistic logic. We instantiate general dialgebraic results, and describe how modal meet-implication logics relate to modal intuitionistic logics
Coastal cities at risk in the Philippines (CCARPH) : investing in climate and disaster resilience project : technical report for years 1-3
The project worked to increase capacity of coastal cities and vulnerable communities in the Philippines to adapt to climate and disaster risks, and move towards resilience in the context of rapid urbanization and economic expansion. Advocating for science-based decision-making, and operating through public-private transdisciplinary collaboration, coastal cities at risk in the Philippines (CCARPH) along with the National Resilience Council (NRC) helped integrate private sector roles in understanding, mitigating, and preventing risks associated with climate change. The report covers project activities, strategic partnerships, outputs and outcomes, with embedded links to websites, publications, policy briefs and innovative approaches
Reversible Computation: Extending Horizons of Computing
This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019. Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first
Recommended from our members
Mechanising and evolving the formal semantics of WebAssembly: the Web's new low-level language
WebAssembly is the first new programming language to be supported natively by all major Web browsers since JavaScript. It is designed to be a natural low-level compilation target for languages such as C, C++, and Rust, enabling programs written in these languages to be compiled and executed efficiently on the Web. WebAssembly’s specification is managed by the W3C WebAssembly Working Group (made up of representatives from a number of major tech companies). Uniquely, the language is specified by way of a full pen-and-paper formal semantics.
This thesis describes a number of ways in which I have both helped to shape the specification of WebAssembly, and built upon it. By mechanising the WebAssembly formal semantics in Isabelle/HOL while it was being drafted, I discovered a number of errors in the specification, drove the adoption of official corrections, and provided the first type soundness proof for the corrected language. This thesis also details a verified type checker and interpreter, and a security type system extension for cryptography primitives, all of which have been mechanised as extensions of my initial WebAssembly mechanisation.
A major component of the thesis is my work on the specification of shared memory concurrency in Web languages: correcting and verifying properties of JavaScript’s existing relaxed memory model, and defining the WebAssembly-specific extensions to the corrected model which have been adopted as the basis of WebAssembly’s official threads specification. A number of deficiencies in the original JavaScript model are detailed. Some errors have been corrected, with the verified fixes officially adopted into subsequent editions of the language specification. However one discovered deficiency is fundamental to the model, an instance of the well-known "thin-air problem".
My work demonstrates the value of formalisation and mechanisation in industrial programming language design, not only in discovering and correcting specification errors, but also in building confidence both in the correctness of the language’s design and in the design of proposed extensions.2019 Google PhD Fellowship in Programming Technology and Software Engineering
Peterhouse Research Fellowshi
Computer Aided Verification
This open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency
Principles of Security and Trust
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems