442 research outputs found

    A Failed Proof Can Yield a Useful Test

    Full text link
    A successful automated program proof is, in software verification, the ultimate triumph. In practice, however, the road to such success is paved with many failed proof attempts. Unlike a failed test, which provides concrete evidence of an actual bug in the program, a failed proof leaves the programmer in the dark. Can we instead learn something useful from it? The work reported here takes advantage of the rich internal information that some automatic provers collect about the program when attempting a proof. If the proof fails, the Proof2Test tool presented in this article uses the counterexample generated by the prover (specifically, the SMT solver underlying the proof environment Boogie, used in the AutoProof system to perform correctness proofs of contract-equipped Eiffel programs) to produce a failed test, which provides the programmer with immediately exploitable information to correct the program. The discussion presents the Proof2Test tool and demonstrates the application of the ideas and tool to a collection of representative examples

    Developing a distributed electronic health-record store for India

    Get PDF
    The DIGHT project is addressing the problem of building a scalable and highly available information store for the Electronic Health Records (EHRs) of the over one billion citizens of India

    A completely unique account of enumeration

    Get PDF
    How can we enumerate the inhabitants of an algebraic datatype? This paper explores a datatype generic solution that works for all regular types and indexed families. The enumerators presented here are provably both complete and unique—they will eventually produce every value exactly once—and fair—they avoid bias when composing enumerators. Finally, these enumerators memoise previously enumerated values whenever possible, thereby avoiding repeatedly recomputing recursive results

    Subsea Blowout Preventer (BOP): Design, Reliability, Testing, Deployment, and Operation and Maintenance Challenges

    Get PDF
    Subsea blowout preventer (BOP) is a safety-related instrumented system that is used in underwater oil drilling to prevent the well to blowout. As oil and gas exploration moves into deeper waters and harsher environments, the setbacks related to reliable functioning of the BOP system and its subsystems remain a major concern for researchers and practitioners. This study aims to systematically review the current state-of-the-art and present a detailed description about some of the recently developed methodologies for through-life management of the BOP system. Challenges associated with the system design, reliability analysis, testing, deployment as well as operability and maintainability are explored, and then the areas requiring further research and development will be identified. A total of 82 documents published since 1980's are critically reviewed and classified according to two proposed frameworks. The first framework categorises the literature based on the depth of water in which the BOP systems operate, with a sub-categorization based on the Macondo disaster. The second framework categorises the literature based on the techniques applied for the reliability analysis of BOP systems, including Failure Mode and Effects Analysis (FMEA), Fault Tree Analysis (FTA), Reliability Block Diagram (RBD), Petri Net (PN), Markov modelling, Bayesian Network (BN), Monte Carlo Simulation (MCS), etc. Our review analysis reveals that the reliability analysis and testing of BOP has received the most attention in the literature, whereas the design, deployment, and operation and maintenance (O&M) of BOPs received the least

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Against the Tide. A Critical Review by Scientists of How Physics and Astronomy Get Done

    Get PDF
    Nobody should have a monopoly of the truth in this universe. The censorship and suppression of challenging ideas against the tide of mainstream research, the blacklisting of scientists, for instance, is neither the best way to do and filter science, nor to promote progress in the human knowledge. The removal of good and novel ideas from the scientific stage is very detrimental to the pursuit of the truth. There are instances in which a mere unqualified belief can occasionally be converted into a generally accepted scientific theory through the screening action of refereed literature and meetings planned by the scientific organizing committees and through the distribution of funds controlled by "club opinions". It leads to unitary paradigms and unitary thinking not necessarily associated to the unique truth. This is the topic of this book: to critically analyze the problems of the official (and sometimes illicit) mechanisms under which current science (physics and astronomy in particular) is being administered and filtered today, along with the onerous consequences these mechanisms have on all of us.\ud \ud The authors, all of them professional researchers, reveal a pessimistic view of the miseries of the actual system, while a glimmer of hope remains in the "leitmotiv" claim towards the freedom in doing research and attaining an acceptable level of ethics in science

    Identity Politics and the New Genetics

    Get PDF
    Racial and ethnic categories have appeared in recent scientific work in novel ways and in relation to a variety of disciplines: medicine, forensics, population genetics and also developments in popular genealogy. Once again, biology is foregrounded in the discussion of human identity. Of particular importance is the preoccupation with origins and personal discovery and the increasing use of racial and ethnic categories in social policy. This new genetic knowledge, expressed in technology and practice, has the potential to disrupt how race and ethnicity are debated, managed and lived. The contributors include medical researchers, anthropologists, historians of science and sociologists of race relations; together, they explore the new and challenging landscape where biology becomes the stuff of identity

    Identity Politics and the New Genetics

    Get PDF
    Racial and ethnic categories have appeared in recent scientific work in novel ways and in relation to a variety of disciplines: medicine, forensics, population genetics and also developments in popular genealogy. Once again, biology is foregrounded in the discussion of human identity. Of particular importance is the preoccupation with origins and personal discovery and the increasing use of racial and ethnic categories in social policy. This new genetic knowledge, expressed in technology and practice, has the potential to disrupt how race and ethnicity are debated, managed and lived. The contributors include medical researchers, anthropologists, historians of science and sociologists of race relations; together, they explore the new and challenging landscape where biology becomes the stuff of identity
    • …
    corecore