6,303 research outputs found
A Concurrency-Agnostic Protocol for Multi-Paradigm Concurrent Debugging Tools
Today's complex software systems combine high-level concurrency models. Each
model is used to solve a specific set of problems. Unfortunately, debuggers
support only the low-level notions of threads and shared memory, forcing
developers to reason about these notions instead of the high-level concurrency
models they chose.
This paper proposes a concurrency-agnostic debugger protocol that decouples
the debugger from the concurrency models employed by the target application. As
a result, the underlying language runtime can define custom breakpoints,
stepping operations, and execution events for each concurrency model it
supports, and a debugger can expose them without having to be specifically
adapted.
We evaluated the generality of the protocol by applying it to SOMns, a
Newspeak implementation, which supports a diversity of concurrency models
including communicating sequential processes, communicating event loops,
threads and locks, fork/join parallelism, and software transactional memory. We
implemented 21 breakpoints and 20 stepping operations for these concurrency
models. For none of these, the debugger needed to be changed. Furthermore, we
visualize all concurrent interactions independently of a specific concurrency
model. To show that tooling for a specific concurrency model is possible, we
visualize actor turns and message sends separately.Comment: International Symposium on Dynamic Language
Team MIT Urban Challenge Technical Report
This technical report describes Team MITs approach to theDARPA Urban Challenge. We have developed a novel strategy forusing many inexpensive sensors, mounted on the vehicle periphery,and calibrated with a new cross-Âmodal calibrationtechnique. Lidar, camera, and radar data streams are processedusing an innovative, locally smooth state representation thatprovides robust perception for real time autonomous control. Aresilient planning and control architecture has been developedfor driving in traffic, comprised of an innovative combination ofwellÂproven algorithms for mission planning, situationalplanning, situational interpretation, and trajectory control. These innovations are being incorporated in two new roboticvehicles equipped for autonomous driving in urban environments,with extensive testing on a DARPA site visit course. Experimentalresults demonstrate all basic navigation and some basic trafficbehaviors, including unoccupied autonomous driving, lanefollowing using pure-Âpursuit control and our local frameperception strategy, obstacle avoidance using kino-Âdynamic RRTpath planning, U-Âturns, and precedence evaluation amongst othercars at intersections using our situational interpreter. We areworking to extend these approaches to advanced navigation andtraffic scenarios
GRChombo : Numerical Relativity with Adaptive Mesh Refinement
In this work, we introduce GRChombo: a new numerical relativity code which
incorporates full adaptive mesh refinement (AMR) using block structured
Berger-Rigoutsos grid generation. The code supports non-trivial
"many-boxes-in-many-boxes" mesh hierarchies and massive parallelism through the
Message Passing Interface (MPI). GRChombo evolves the Einstein equation using
the standard BSSN formalism, with an option to turn on CCZ4 constraint damping
if required. The AMR capability permits the study of a range of new physics
which has previously been computationally infeasible in a full 3+1 setting,
whilst also significantly simplifying the process of setting up the mesh for
these problems. We show that GRChombo can stably and accurately evolve standard
spacetimes such as binary black hole mergers and scalar collapses into black
holes, demonstrate the performance characteristics of our code, and discuss
various physics problems which stand to benefit from the AMR technique.Comment: 48 pages, 24 figure
Designing and Implementing a Distributed Social Network Service for Mobile Devices
The paper presents a new paradigm for building social network services. The proposed plat-form is called eXtensible Social Network. As it uses the XMPP protocol for authentication and communication, it allows users from different service providers interact with each other, without having to change their accounts. Moreover, the platform provides means for users to authenticate and interact with each other while temporary disconnected from the Internet. Moreover, the platform is specially designed for mobile devices, running on their restrictive operating systems and taking advantage of the systems optimizations.Social Network, Mobile Devices, Service, XMPP, iOS, Android, Distributed, Plat-form
Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations
Quantum key distribution (QKD) has the potential to improve communications
security by offering cryptographic keys whose security relies on the
fundamental properties of quantum physics. The use of a trusted quantum
receiver on an orbiting satellite is the most practical near-term solution to
the challenge of achieving long-distance (global-scale) QKD, currently limited
to a few hundred kilometers on the ground. This scenario presents unique
challenges, such as high photon losses and restricted classical data
transmission and processing power due to the limitations of a typical satellite
platform. Here we demonstrate the feasibility of such a system by implementing
a QKD protocol, with optical transmission and full post-processing, in the
high-loss regime using minimized computing hardware at the receiver. Employing
weak coherent pulses with decoy states, we demonstrate the production of secure
key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility
of a satellite uplink by generating secure key while experimentally emulating
the varying channel losses predicted for realistic low-Earth-orbit satellite
passes at 600 km altitude. With a 76 MHz source and including finite-size
analysis, we extract 3374 bits of secure key from the best pass. We also
illustrate the potential benefit of combining multiple passes together: while
one suboptimal "upper-quartile" pass produces no finite-sized key with our
source, the combination of three such passes allows us to extract 165 bits of
secure key. Alternatively, we find that by increasing the signal rate to 300
MHz it would be possible to extract 21570 bits of secure finite-sized key in
just a single upper-quartile pass.Comment: 12 pages, 7 figures, 2 table
- âŠ