1,547 research outputs found
Topology and Geometry of the CfA2 Redshift Survey
We analyse the redshift space topology and geometry of the nearby Universe by
computing the Minkowski functionals of the Updated Zwicky Catalogue (UZC). The
UZC contains the redshifts of almost 20,000 galaxies, is 96% complete to the
limiting magnitude m_Zw=15.5 and includes the Center for Astrophysics (CfA)
Redshift Survey (CfA2). From the UZC we can extract volume limited samples
reaching a depth of 70 hMpc before sparse sampling dominates. We quantify the
shape of the large-scale galaxy distribution by deriving measures of planarity
and filamentarity from the Minkowski functionals. The nearby Universe shows a
large degree of planarity and a small degree of filamentarity. This quantifies
the sheet-like structure of the Great Wall which dominates the northern region
(CfA2N) of the UZC. We compare these results with redshift space mock
catalogues constructed from high resolution N-body simulations of two Cold Dark
Matter models with either a decaying massive neutrino (tauCDM) or a non-zero
cosmological constant (LambdaCDM). We use semi-analytic modelling to form and
evolve galaxies in these dark matter-only simulations. We are thus able, for
the first time, to compile redshift space mock catalogues which contain
galaxies, along with their observable properties, rather than dark matter
particles alone. In both models the large scale galaxy distribution is less
coherent than the observed distribution, especially with regard to the large
degree of planarity of the real survey. However, given the small volume of the
region studied, this disagreement can still be a result of cosmic variance.Comment: 14 pages including 10 figures. Accepted for publication in Monthly
Notice
DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework
In this demo, we provide an overview of the macOS Bluetooth stack internals
and gain access to undocumented low-level interfaces. We leverage this
knowledge to add macOS support to the InternalBlue firmware modification and
wireless experimentation framework.Comment: 13th ACM Conference on Security and Privacy in Wireless and Mobile
Network
Efficient Implementation of a Higher-Order Language with Built-In AD
We show that Automatic Differentiation (AD) operators can be provided in a dynamic language without sacrificing numeric performance. To achieve this, general forward and reverse AD functions are added to a simple high-level dynamic language, and support for them is included in an aggressive optimizing compiler. Novel technical mechanisms are discussed, which have the ability to migrate the AD transformations from run-time to compile-time. The resulting system, although only a research prototype, exhibits startlingly good performance. In fact, despite the potential inefficiencies entailed by support of a functional-programming language and a first-class AD operator, performance is competitive with the fastest available preprocessor-based Fortran AD systems. On benchmarks involving nested use of the AD operators, it can even dramatically exceed their performance
Recommended from our members
Optimisations for quadrature representations of finite element tensors through automated code generation
We examine aspects of the computation of finite element matrices and vectors
which are made possible by automated code generation. Given a variational form
in a syntax which resembles standard mathematical notation, the low-level
computer code for building finite element tensors, typically matrices, vectors
and scalars, can be generated automatically via a form compiler. In particular,
the generation of code for computing finite element matrices using a quadrature
approach is addressed. For quadrature representations, a number of optimisation
strategies which are made possible by automated code generation are presented.
The relative performance of two different automatically generated
representations of finite element matrices is examined, with a particular
emphasis on complicated variational forms. It is shown that approaches which
perform best for simple forms are not tractable for more complicated problems
in terms of run time performance, the time required to generate the code or the
size of the generated code. The approach and optimisations elaborated here are
effective for a range of variational forms
Tailored Source Code Transformations to Synthesize Computationally Diverse Program Variants
The predictability of program execution provides attackers a rich source of
knowledge who can exploit it to spy or remotely control the program. Moving
target defense addresses this issue by constantly switching between many
diverse variants of a program, which reduces the certainty that an attacker can
have about the program execution. The effectiveness of this approach relies on
the availability of a large number of software variants that exhibit different
executions. However, current approaches rely on the natural diversity provided
by off-the-shelf components, which is very limited. In this paper, we explore
the automatic synthesis of large sets of program variants, called sosies.
Sosies provide the same expected functionality as the original program, while
exhibiting different executions. They are said to be computationally diverse.
This work addresses two objectives: comparing different transformations for
increasing the likelihood of sosie synthesis (densifying the search space for
sosies); demonstrating computation diversity in synthesized sosies. We
synthesized 30184 sosies in total, for 9 large, real-world, open source
applications. For all these programs we identified one type of program analysis
that systematically increases the density of sosies; we measured computation
diversity for sosies of 3 programs and found diversity in method calls or data
in more than 40% of sosies. This is a step towards controlled massive
unpredictability of software
- âŠ