1,547 research outputs found

    Topology and Geometry of the CfA2 Redshift Survey

    Get PDF
    We analyse the redshift space topology and geometry of the nearby Universe by computing the Minkowski functionals of the Updated Zwicky Catalogue (UZC). The UZC contains the redshifts of almost 20,000 galaxies, is 96% complete to the limiting magnitude m_Zw=15.5 and includes the Center for Astrophysics (CfA) Redshift Survey (CfA2). From the UZC we can extract volume limited samples reaching a depth of 70 hMpc before sparse sampling dominates. We quantify the shape of the large-scale galaxy distribution by deriving measures of planarity and filamentarity from the Minkowski functionals. The nearby Universe shows a large degree of planarity and a small degree of filamentarity. This quantifies the sheet-like structure of the Great Wall which dominates the northern region (CfA2N) of the UZC. We compare these results with redshift space mock catalogues constructed from high resolution N-body simulations of two Cold Dark Matter models with either a decaying massive neutrino (tauCDM) or a non-zero cosmological constant (LambdaCDM). We use semi-analytic modelling to form and evolve galaxies in these dark matter-only simulations. We are thus able, for the first time, to compile redshift space mock catalogues which contain galaxies, along with their observable properties, rather than dark matter particles alone. In both models the large scale galaxy distribution is less coherent than the observed distribution, especially with regard to the large degree of planarity of the real survey. However, given the small volume of the region studied, this disagreement can still be a result of cosmic variance.Comment: 14 pages including 10 figures. Accepted for publication in Monthly Notice

    DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework

    Full text link
    In this demo, we provide an overview of the macOS Bluetooth stack internals and gain access to undocumented low-level interfaces. We leverage this knowledge to add macOS support to the InternalBlue firmware modification and wireless experimentation framework.Comment: 13th ACM Conference on Security and Privacy in Wireless and Mobile Network

    Efficient Implementation of a Higher-Order Language with Built-In AD

    Get PDF
    We show that Automatic Differentiation (AD) operators can be provided in a dynamic language without sacrificing numeric performance. To achieve this, general forward and reverse AD functions are added to a simple high-level dynamic language, and support for them is included in an aggressive optimizing compiler. Novel technical mechanisms are discussed, which have the ability to migrate the AD transformations from run-time to compile-time. The resulting system, although only a research prototype, exhibits startlingly good performance. In fact, despite the potential inefficiencies entailed by support of a functional-programming language and a first-class AD operator, performance is competitive with the fastest available preprocessor-based Fortran AD systems. On benchmarks involving nested use of the AD operators, it can even dramatically exceed their performance

    Tailored Source Code Transformations to Synthesize Computationally Diverse Program Variants

    Get PDF
    The predictability of program execution provides attackers a rich source of knowledge who can exploit it to spy or remotely control the program. Moving target defense addresses this issue by constantly switching between many diverse variants of a program, which reduces the certainty that an attacker can have about the program execution. The effectiveness of this approach relies on the availability of a large number of software variants that exhibit different executions. However, current approaches rely on the natural diversity provided by off-the-shelf components, which is very limited. In this paper, we explore the automatic synthesis of large sets of program variants, called sosies. Sosies provide the same expected functionality as the original program, while exhibiting different executions. They are said to be computationally diverse. This work addresses two objectives: comparing different transformations for increasing the likelihood of sosie synthesis (densifying the search space for sosies); demonstrating computation diversity in synthesized sosies. We synthesized 30184 sosies in total, for 9 large, real-world, open source applications. For all these programs we identified one type of program analysis that systematically increases the density of sosies; we measured computation diversity for sosies of 3 programs and found diversity in method calls or data in more than 40% of sosies. This is a step towards controlled massive unpredictability of software
    • 

    corecore