7,885 research outputs found
Relativistic Fermi acceleration with shock compressed turbulence
This paper presents numerical simulations of test particle Fermi acceleration
at relativistic shocks of Lorentz factor Gamma_sh = 2-60, using a realistic
downstream magnetic structure obtained from the shock jump conditions. The
upstream magnetic field is described as pure Kolmogorov turbulence; the
corresponding downstream magnetic field lies predominantly in the plane
tangential to the shock surface and the coherence length is smaller along the
shock normal than in the tangential plane. Acceleration is nonetheless
efficient and leads to powerlaw spectra with index s = 2.6-2.7 at large shock
Lorentz factor Gamma_sh >> 1, markedly steeper than for isotropic scattering
downstream. The acceleration timescale t_acc in the upstream rest frame becomes
a fraction of Larmor time t_L in the ultra-relativistic limit, t_acc ~ 10
t_L/Gamma_sh. Astrophysical applications are discussed, in particular the
acceleration in gamma-ray bursts internal and external shocks.Comment: 11 pages; 10 figures; submitted to MNRA
Towards Ecology Inspired Software Engineering
Ecosystems are complex and dynamic systems. Over billions of years, they have
developed advanced capabilities to provide stable functions, despite changes in
their environment. In this paper, we argue that the laws of organization and
development of ecosystems provide a solid and rich source of inspiration to lay
the foundations for novel software construction paradigms that provide
stability as much as openness.Comment: No. RR-7952 (2012
On the efficiency of Fermi acceleration at relativistic shocks
It is shown that Fermi acceleration at an ultra-relativistic shock wave
cannot operate on a particle for more than 1 1/2 Fermi cycle (i.e., u -> d -> u
-> d) if the particle Larmor radius is much smaller than the coherence length
of the magnetic field on both sides of the shock, as is usually assumed. This
conclusion is shown to be in excellent agreement with recent numerical
simulations. We thus argue that efficient Fermi acceleration at
ultra-relativistic shock waves requires significant non-linear processing of
the far upstream magnetic field with strong amplification of the small scale
magnetic power. The streaming or transverse Weibel instabilities are likely to
play a key role in this respect.Comment: 4 pages, 2 figures; to appear in ApJ Letter
Effects of cell elasticity on the migration behavior of a monolayer of motile cells: Sharp Interface Model
In order to study the effect of cell elastic properties on the behavior of
assemblies of motile cells, this paper describes an alternative to the cell
phase field (CPF) \cite{Palmieri2015} we have previously proposed. The CPF is a
multi-scale approach to simulating many cells which tracked individual cells
and allowed for large deformations. Though results were largely in agreement
with experiment that focus on the migration of a soft cancer cell in a
confluent layer of normal cells \cite{Lee2012}, simulations required large
computing resources, making more detailed study unfeasible. In this work we
derive a sharp interface limit of CPF, including all interactions and
parameters. This new model offers over fold speedup when compared to our
original CPF implementation. We demonstrate that this model captures similar
behavior and allows us to obtain new results that were previously intractable.
We obtain the full velocity distribution for a large range of degrees of
confluence, , and show regimes where its tail is heavier and lighter than
a normal distribution. Furthermore, we fully characterize the velocity
distribution with a single parameter, and its dependence on is fully
determined. Finally, cell motility is shown to linearly decrease with
increasing , consistent with previous theoretical results
Tailored Source Code Transformations to Synthesize Computationally Diverse Program Variants
The predictability of program execution provides attackers a rich source of
knowledge who can exploit it to spy or remotely control the program. Moving
target defense addresses this issue by constantly switching between many
diverse variants of a program, which reduces the certainty that an attacker can
have about the program execution. The effectiveness of this approach relies on
the availability of a large number of software variants that exhibit different
executions. However, current approaches rely on the natural diversity provided
by off-the-shelf components, which is very limited. In this paper, we explore
the automatic synthesis of large sets of program variants, called sosies.
Sosies provide the same expected functionality as the original program, while
exhibiting different executions. They are said to be computationally diverse.
This work addresses two objectives: comparing different transformations for
increasing the likelihood of sosie synthesis (densifying the search space for
sosies); demonstrating computation diversity in synthesized sosies. We
synthesized 30184 sosies in total, for 9 large, real-world, open source
applications. For all these programs we identified one type of program analysis
that systematically increases the density of sosies; we measured computation
diversity for sosies of 3 programs and found diversity in method calls or data
in more than 40% of sosies. This is a step towards controlled massive
unpredictability of software
Reasoning and Improving on Software Resilience against Unanticipated Exceptions
In software, there are the errors anticipated at specification and design
time, those encountered at development and testing time, and those that happen
in production mode yet never anticipated. In this paper, we aim at reasoning on
the ability of software to correctly handle unanticipated exceptions. We
propose an algorithm, called short-circuit testing, which injects exceptions
during test suite execution so as to simulate unanticipated errors. This
algorithm collects data that is used as input for verifying two formal
exception contracts that capture two resilience properties. Our evaluation on 9
test suites, with 78% line coverage in average, analyzes 241 executed catch
blocks, shows that 101 of them expose resilience properties and that 84 can be
transformed to be more resilient
Empirical Evidence of Large-Scale Diversity in API Usage of Object-Oriented Software
In this paper, we study how object-oriented classes are used across thousands
of software packages. We concentrate on "usage diversity'", defined as the
different statically observable combinations of methods called on the same
object. We present empirical evidence that there is a significant usage
diversity for many classes. For instance, we observe in our dataset that Java's
String is used in 2460 manners. We discuss the reasons of this observed
diversity and the consequences on software engineering knowledge and research
Detecting Turning Points with Many Predictors through Hidden Markov Models
This paper explores the American business cycle with the Hidden Markov Model (HMM) as a monitoring tool using monthly data. It exhibits ten US time series which offer reliable information to detect recessions in real time. It also proposes and assesses the performances of different and complementary “recession models” based on Markovian processes, discusses the most efficient and easiest way of encompassing information through these models and draws three main conclusions: simple HMM are decisive to monitor the business cycle and some series are proved highly reliable; more sophisticated models such as the Dynamic Factor with Markov Switching (DFMS) model or Stock and Watson’s Experimental Recession Index seem not to be more powerful than simple (univariate or pseudo-multivariate) Hidden Markov Models, which remain far more parsimonious; combining information in temporal space seems to work marginally better than in probability space for high frequency data. We conclude about leading and “real time detection” properties related to HMM and give some hints for further research.Business Cycle, Markov Switching, Dynamic Factor, Coincident Indicators
Dynamic Analysis can be Improved with Automatic Test Suite Refactoring
Context: Developers design test suites to automatically verify that software
meets its expected behaviors. Many dynamic analysis techniques are performed on
the exploitation of execution traces from test cases. However, in practice,
there is only one trace that results from the execution of one manually-written
test case.
Objective: In this paper, we propose a new technique of test suite
refactoring, called B-Refactoring. The idea behind B-Refactoring is to split a
test case into small test fragments, which cover a simpler part of the control
flow to provide better support for dynamic analysis.
Method: For a given dynamic analysis technique, our test suite refactoring
approach monitors the execution of test cases and identifies small test cases
without loss of the test ability. We apply B-Refactoring to assist two existing
analysis tasks: automatic repair of if-statements bugs and automatic analysis
of exception contracts.
Results: Experimental results show that test suite refactoring can
effectively simplify the execution traces of the test suite. Three real-world
bugs that could previously not be fixed with the original test suite are fixed
after applying B-Refactoring; meanwhile, exception contracts are better
verified via applying B-Refactoring to original test suites.
Conclusions: We conclude that applying B-Refactoring can effectively improve
the purity of test cases. Existing dynamic analysis tasks can be enhanced by
test suite refactoring
- …