52,894 research outputs found

    The Meaning of Memory Safety

    Full text link
    We give a rigorous characterization of what it means for a programming language to be memory safe, capturing the intuition that memory safety supports local reasoning about state. We formalize this principle in two ways. First, we show how a small memory-safe language validates a noninterference property: a program can neither affect nor be affected by unreachable parts of the state. Second, we extend separation logic, a proof system for heap-manipulating programs, with a memory-safe variant of its frame rule. The new rule is stronger because it applies even when parts of the program are buggy or malicious, but also weaker because it demands a stricter form of separation between parts of the program state. We also consider a number of pragmatically motivated variations on memory safety and the reasoning principles they support. As an application of our characterization, we evaluate the security of a previously proposed dynamic monitor for memory safety of heap-allocated data.Comment: POST'18 final versio

    Tichý and Fictional Names

    Get PDF
    The paper examines two possible analyses of fictional names within Pavel Tichý’s Transparent Intensional Logic. The first of them is the analysis actually proposed by Tichý in his (1988) book The Foundations of Frege’s Logic. He analysed fictional names in terms of free variables. I will introduce, explain, and assess this analysis. Subsequently, I will explain Tichý’s notion of individual role (office, thing-to-be). On the basis of this notion, I will outline and defend the second analysis of fictional names. This analysis is close to the approach known in the literature as role realism (the most prominent advocates of this position are Nicholas Wolterstorff, Gregory Currie, and Peter Lamarque)

    Neural computation of arithmetic functions

    Get PDF
    A neuron is modeled as a linear threshold gate, and the network architecture considered is the layered feedforward network. It is shown how common arithmetic functions such as multiplication and sorting can be efficiently computed in a shallow neural network. Some known results are improved by showing that the product of two n-bit numbers and sorting of n n-bit numbers can be computed by a polynomial-size neural network using only four and five unit delays, respectively. Moreover, the weights of each threshold element in the neural networks require O(log n)-bit (instead of n -bit) accuracy. These results can be extended to more complicated functions such as multiple products, division, rational functions, and approximation of analytic functions

    Absoluteness of Truth and the Lvov–Warsaw School (Twardowski, Kotarbiński, Leśniewski, Łukasiewicz, Tarski, Kokoszyńska)

    Get PDF
    According to Twardowski, truth is if it is independent of temporal coordinates. This understanding was one of the main arguments against truth-relativism. Kotarbiński rejected this view as far the issue concerns sentences about the future, but he did not elaborated this idea from a logical point of view. Leśniewski offered an argument that truth is eternal if and only if it is sempiternal; Twardowski shared this opinion. Łukasiewicz rejected sempiternality but retained eternality. His main novelty consisted in applying three-valued logic to explain how it is possible that truth is not sempiternal. Łukasiewicz also pointed out that bivalence together with the principle of causality implies radical determinism. Kotarbiński accepted Leśniewski’s criticism and he defended Twardowski’s view in Elementy. Tarski did not explicitly addressed to the problem of absoluteness or temporality of truth. On the other hand, Kokoszyńska proposed an interpretation of the semantic theory of truth as absolute. It is possible to justify absoluteness of truth in semantics cum the principle of bivalence and show that bivalence does not imply determinism

    Two-Bit Gates are Universal for Quantum Computation

    Full text link
    A proof is given, which relies on the commutator algebra of the unitary Lie groups, that quantum gates operating on just two bits at a time are sufficient to construct a general quantum circuit. The best previous result had shown the universality of three-bit gates, by analogy to the universality of the Toffoli three-bit gate of classical reversible computing. Two-bit quantum gates may be implemented by magnetic resonance operations applied to a pair of electronic or nuclear spins. A ``gearbox quantum computer'' proposed here, based on the principles of atomic force microscopy, would permit the operation of such two-bit gates in a physical system with very long phase breaking (i.e., quantum phase coherence) times. Simpler versions of the gearbox computer could be used to do experiments on Einstein-Podolsky-Rosen states and related entangled quantum states.Comment: 21 pages, REVTeX 3.0, two .ps figures available from author upon reques
    corecore