798 research outputs found

    A true concurrent model of smart contracts executions

    Full text link
    The development of blockchain technologies has enabled the trustless execution of so-called smart contracts, i.e. programs that regulate the exchange of assets (e.g., cryptocurrency) between users. In a decentralized blockchain, the state of smart contracts is collaboratively maintained by a peer-to-peer network of mutually untrusted nodes, which collect from users a set of transactions (representing the required actions on contracts), and execute them in some order. Once this sequence of transactions is appended to the blockchain, the other nodes validate it, re-executing the transactions in the same order. The serial execution of transactions does not take advantage of the multi-core architecture of modern processors, so contributing to limit the throughput. In this paper we propose a true concurrent model of smart contract execution. Based on this, we show how static analysis of smart contracts can be exploited to parallelize the execution of transactions.Comment: Full version of the paper presented at COORDINATION 202

    Method and Apparatus for Water Jet Drilling of Rock

    Get PDF
    Rock drilling method and apparatus utilizing high pressure water jets for drilling holes of relatively small diameter at speeds significantly greater than that attainable with existing drilling tools. Greatly increased drilling rates are attained due to jet nozzle geometry and speed of rotation. The jet nozzle design has two orifices, one pointing axially ahead in the direction of travel and the second inclined at an angle of approximately 30° from the axis. The two orifices have diameters in the ratio of approximately 1:2. Liquid jet velocities in excess of 1,000 ft/sec are used, and the nozzle is rotated at speeds up to 1,000 rpm and higher

    High-energy-low-temperature technologies for the synthesis of nanoparticles: Microwaves and high pressure

    Get PDF
    Microwave Solvothermal Synthesis (MSS) is a chemical technology, where apart from possible effects of microwaves on the chemical reaction paths, microwave heating allows the precise planning of a time-temperature schedule, as well as to achieve high super-saturation of the reagents uniformly in the reactor vessel. Thus, MSS is suitable for production of nanoparticles with small grain size distribution and a high degree of crystallinity. A further advantage of the technology is a much lower synthesis temperature than for gas phase, plasma or sol-gel technologies. New reactors have been developed to exploit these advantages of the MSS technology of nanoparticles synthesis and to scale up the production rate. Reactor design and realization has been shown to be decisive and critical for the control of the MSS technology. Examples of oxidic and phosphatic nanoparticles synthesis have been reported

    Partially-commutative context-free languages

    Get PDF
    The paper is about a class of languages that extends context-free languages (CFL) and is stable under shuffle. Specifically, we investigate the class of partially-commutative context-free languages (PCCFL), where non-terminal symbols are commutative according to a binary independence relation, very much like in trace theory. The class has been recently proposed as a robust class subsuming CFL and commutative CFL. This paper surveys properties of PCCFL. We identify a natural corresponding automaton model: stateless multi-pushdown automata. We show stability of the class under natural operations, including homomorphic images and shuffle. Finally, we relate expressiveness of PCCFL to two other relevant classes: CFL extended with shuffle and trace-closures of CFL. Among technical contributions of the paper are pumping lemmas, as an elegant completion of known pumping properties of regular languages, CFL and commutative CFL.Comment: In Proceedings EXPRESS/SOS 2012, arXiv:1208.244

    Multiple Pulsejet Boring Device

    Get PDF
    A method and device for boring a hole [5] through a material along a desired path includes an umbilical subsystem [2000] connected to a boring subsystem [3000] having a plurality of pulsejets [3100]. These pulsejets [3100] repeatedly receive and ignite a combustible fluid [7] in a combustion chamber [3230] causing a portion of the fluid [7] to be forced out of a nozzle [3260] at high speeds as a fluid slug [10] that impacts materials ahead of the pulsejet [3100]. A controller [3310] controls the amount of fluid provided to each pulsejet [3100], and the firing timing, thereby controlling the intensity in which each slug [10] impacts the material. By modulating the intensity and firing sequence of each of the pulsejets [3100], material ahead of the boring subsystem [3000] is differentially bored thereby allowing steering of the boring subsystem [3000]

    System for Rapidly Boring Through Materials

    Get PDF
    The present invention is a self-contained, high-energy liquid rock-boring system that will bore a small-diameter access hole [5] several hundred meters through hard granite and other obstacles within minutes of deployment. It employs a land unit [100] platform subsystem [1000] with an energetic fluid fuel reservoir [1300] and a boring subsystem [3000] having a plurality of pulsejets [3100]. Each pulsejet [3100] repeatedly ignites the energetic fluid [7] causing a plurality of rapidly-expanding gas bubbles [3250] which create and force a plurality liquid slugs [10] ahead of them rapidly out through a nozzle [3260] causing the slugs [10] to impact against materials ahead of the nozzles [3260], boring an access hole [5]. The system also employs an umbilical subsystem [2000] connecting the boring [3000] and the platform subsystems [1000]. The system can be used to rapidly bore an access hole [5] to provide air and resources to trapped miners. Alternatively, the system may also be used to bore an access hole [5] to underground threatening targets to neutralize them

    A Framework to Synergize Partial Order Reduction with State Interpolation

    Full text link
    We address the problem of reasoning about interleavings in safety verification of concurrent programs. In the literature, there are two prominent techniques for pruning the search space. First, there are well-investigated trace-based methods, collectively known as "Partial Order Reduction (POR)", which operate by weakening the concept of a trace by abstracting the total order of its transitions into a partial order. Second, there is state-based interpolation where a collection of formulas can be generalized by taking into account the property to be verified. Our main contribution is a framework that synergistically combines POR with state interpolation so that the sum is more than its parts

    Noninflammatory Changes of Microglia Are Sufficient to Cause Epilepsy.

    Get PDF
    Microglia are well known to play a critical role in maintaining brain homeostasis. However, their role in epileptogenesis has yet to be determined. Here, we demonstrate that elevated mTOR signaling in mouse microglia leads to phenotypic changes, including an amoeboid-like morphology, increased proliferation, and robust phagocytosis activity, but without a significant induction of pro-inflammatory cytokines. We further provide evidence that these noninflammatory changes in microglia disrupt homeostasis of the CNS, leading to reduced synapse density, marked microglial infiltration into hippocampal pyramidal layers, moderate neuronal degeneration, and massive proliferation of astrocytes. Moreover, the mice thus affected develop severe early-onset spontaneous recurrent seizures (SRSs). Therefore, we have revealed an epileptogenic mechanism that is independent of the microglial inflammatory response. Our data suggest that microglia could be an opportune target for epilepsy prevention

    Concurrent Computing with Shared Replicated Memory

    Get PDF
    The behavioural theory of concurrent systems states that any concurrent system can be captured by a behaviourally equivalent concurrent Abstract State Machine (cASM). While the theory in general assumes shared locations, it remains valid, if different agents can only interact via messages, i.e. sharing is restricted to mailboxes. There may even be a strict separation between memory managing agents and other agents that can only access the shared memory by sending query and update requests to the memory agents. This article is dedicated to an investigation of replicated data that is maintained by a memory management subsystem, whereas the replication neither appears in the requests nor in the corresponding answers. We show how the behaviour of a concurrent system with such a memory management can be specified using concurrent communicating ASMs. We provide several refinements of a high-level ground model addressing different replication policies and internal messaging between data centres. For all these refinements we analyse their effects on the runs such that decisions concerning the degree of consistency can be consciously made.Comment: 23 page
    • …
    corecore