1,117 research outputs found
Automatic Verification of Erlang-Style Concurrency
This paper presents an approach to verify safety properties of Erlang-style,
higher-order concurrent programs automatically. Inspired by Core Erlang, we
introduce Lambda-Actor, a prototypical functional language with
pattern-matching algebraic data types, augmented with process creation and
asynchronous message-passing primitives. We formalise an abstract model of
Lambda-Actor programs called Actor Communicating System (ACS) which has a
natural interpretation as a vector addition system, for which some verification
problems are decidable. We give a parametric abstract interpretation framework
for Lambda-Actor and use it to build a polytime computable, flow-based,
abstract semantics of Lambda-Actor programs, which we then use to bootstrap the
ACS construction, thus deriving a more accurate abstract model of the input
program. We have constructed Soter, a tool implementation of the verification
method, thereby obtaining the first fully-automatic, infinite-state model
checker for a core fragment of Erlang. We find that in practice our abstraction
technique is accurate enough to verify an interesting range of safety
properties. Though the ACS coverability problem is Expspace-complete, Soter can
analyse these verification problems surprisingly efficiently.Comment: 12 pages plus appendix, 4 figures, 1 table. The tool is available at
http://mjolnir.cs.ox.ac.uk/soter
The Spread of Sleep Loss Influences Drug Use in Adolescent Social Networks
Troubled sleep is a commonly cited consequence of adolescent drug use, but it has rarely been studied as a cause. Nor have there been any studies of the extent to which sleep behavior can spread in social networks from person to person to person. Here we map the social networks of 8,349 adolescents in order to study how sleep behavior spreads, how drug use behavior spreads, and how a friend's sleep behavior influences one's own drug use. We find clusters of poor sleep behavior and drug use that extend up to four degrees of separation (to one's friends' friends' friends' friends) in the social network. Prospective regression models show that being central in the network negatively influences future sleep outcomes, but not vice versa. Moreover, if a friend sleeps ≤7 hours, it increases the likelihood a person sleeps ≤7 hours by 11%. If a friend uses marijuana, it increases the likelihood of marijuana use by 110%. Finally, the likelihood that an individual uses drugs increases by 19% when a friend sleeps ≤7 hours, and a mediation analysis shows that 20% of this effect results from the spread of sleep behavior from one person to another. This is the first study to suggest that the spread of one behavior in social networks influences the spread of another. The results indicate that interventions should focus on healthy sleep to prevent drug use and targeting specific individuals may improve outcomes across the entire social network
Recommended from our members
The Spread of Sleep Loss Influences Drug Use in Adolescent Social Networks
Troubled sleep is a commonly cited consequence of adolescent drug use, but it has rarely been studied as a cause. Nor have there been any studies of the extent to which sleep behavior can spread in social networks from person to person to person. Here we map the social networks of 8,349 adolescents in order to study how sleep behavior spreads, how drug use behavior spreads, and how a friend's sleep behavior influences one's own drug use. We find clusters of poor sleep behavior and drug use that extend up to four degrees of separation (to one's friends' friends' friends' friends) in the social network. Prospective regression models show that being central in the network negatively influences future sleep outcomes, but not vice versa. Moreover, if a friend sleeps ≤7 hours, it increases the likelihood a person sleeps ≤7 hours by 11%. If a friend uses marijuana, it increases the likelihood of marijuana use by 110%. Finally, the likelihood that an individual uses drugs increases by 19% when a friend sleeps ≤7 hours, and a mediation analysis shows that 20% of this effect results from the spread of sleep behavior from one person to another. This is the first study to suggest that the spread of one behavior in social networks influences the spread of another. The results indicate that interventions should focus on healthy sleep to prevent drug use and targeting specific individuals may improve outcomes across the entire social network.Sociolog
Predicting the academic underachievement in high school in Spain over the next few years: A dynamic modelling approach
[EN] In this paper we propose a dynamic model to understand the evolution of the academic underachievement in a high school in Spain. This model is based on ideas of Christakis and Fowler where individual habits may be transmitted by social contact. Thus, to build the model we suppose that a student has academic failure when she/he gets into study habits transmitted by students with bad academic habits. From the available academic results of the Spanish high school educational system during the period 1999 2008, we fit the model to the data in order to obtain the parameters of the model. Then, we predict the academic underachievement evolution over the next few years.This work has been partially supported by the Spanish M.C.Y.T. grant MTM2009-08587 and the Universitat Politecnica de Valencia grant PAID06-09-2588Camacho Vidal, FJ.; Cortés, J.; Micle, RM.; Sánchez-Sánchez, A. (2013). Predicting the academic underachievement in high school in Spain over the next few years: A dynamic modelling approach. Mathematical and Computer Modelling. 57(7):1703-1708. https://doi.org/10.1016/j.mcm.2011.11.011S1703170857
A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs
The actor model is an attractive foundation for developing concurrent
applications because actors are isolated concurrent entities that communicate
through asynchronous messages and do not share state. Thereby, they avoid
concurrency bugs such as data races, but are not immune to concurrency bugs in
general. This study taxonomizes concurrency bugs in actor-based programs
reported in literature. Furthermore, it analyzes the bugs to identify the
patterns causing them as well as their observable behavior. Based on this
taxonomy, we further analyze the literature and find that current approaches to
static analysis and testing focus on communication deadlocks and message
protocol violations. However, they do not provide solutions to identify
livelocks and behavioral deadlocks. The insights obtained in this study can be
used to improve debugging support for actor-based programs with new debugging
techniques to identify the root cause of complex concurrency bugs.Comment: - Submitted for review - Removed section 6 "Research Roadmap for
Debuggers", its content was summarized in the Future Work section - Added
references for section 1, section 3, section 4.3 and section 5.1 - Updated
citation
Studying Paths of Participation in Viral Diffusion Process
Authors propose a conceptual model of participation in viral diffusion
process composed of four stages: awareness, infection, engagement and action.
To verify the model it has been applied and studied in the virtual social chat
environment settings. The study investigates the behavioral paths of actions
that reflect the stages of participation in the diffusion and presents
shortcuts, that lead to the final action, i.e. the attendance in a virtual
event. The results show that the participation in each stage of the process
increases the probability of reaching the final action. Nevertheless, the
majority of users involved in the virtual event did not go through each stage
of the process but followed the shortcuts. That suggests that the viral
diffusion process is not necessarily a linear sequence of human actions but
rather a dynamic system.Comment: In proceedings of the 4th International Conference on Social
Informatics, SocInfo 201
From Social Data Mining to Forecasting Socio-Economic Crisis
Socio-economic data mining has a great potential in terms of gaining a better
understanding of problems that our economy and society are facing, such as
financial instability, shortages of resources, or conflicts. Without
large-scale data mining, progress in these areas seems hard or impossible.
Therefore, a suitable, distributed data mining infrastructure and research
centers should be built in Europe. It also appears appropriate to build a
network of Crisis Observatories. They can be imagined as laboratories devoted
to the gathering and processing of enormous volumes of data on both natural
systems such as the Earth and its ecosystem, as well as on human
techno-socio-economic systems, so as to gain early warnings of impending
events. Reality mining provides the chance to adapt more quickly and more
accurately to changing situations. Further opportunities arise by individually
customized services, which however should be provided in a privacy-respecting
way. This requires the development of novel ICT (such as a self- organizing
Web), but most likely new legal regulations and suitable institutions as well.
As long as such regulations are lacking on a world-wide scale, it is in the
public interest that scientists explore what can be done with the huge data
available. Big data do have the potential to change or even threaten democratic
societies. The same applies to sudden and large-scale failures of ICT systems.
Therefore, dealing with data must be done with a large degree of responsibility
and care. Self-interests of individuals, companies or institutions have limits,
where the public interest is affected, and public interest is not a sufficient
justification to violate human rights of individuals. Privacy is a high good,
as confidentiality is, and damaging it would have serious side effects for
society.Comment: 65 pages, 1 figure, Visioneer White Paper, see
http://www.visioneer.ethz.c
Your Proof Fails? Testing Helps to Find the Reason
Applying deductive verification to formally prove that a program respects its
formal specification is a very complex and time-consuming task due in
particular to the lack of feedback in case of proof failures. Along with a
non-compliance between the code and its specification (due to an error in at
least one of them), possible reasons of a proof failure include a missing or
too weak specification for a called function or a loop, and lack of time or
simply incapacity of the prover to finish a particular proof. This work
proposes a new methodology where test generation helps to identify the reason
of a proof failure and to exhibit a counter-example clearly illustrating the
issue. We describe how to transform an annotated C program into C code suitable
for testing and illustrate the benefits of the method on comprehensive
examples. The method has been implemented in STADY, a plugin of the software
analysis platform FRAMA-C. Initial experiments show that detecting
non-compliances and contract weaknesses allows to precisely diagnose most proof
failures.Comment: 11 pages, 10 figure
Computational modelling with uncertainty of frequent users of e-commerce in Spain using an age-group dynamic nonlinear model with varying size population
[EN] Electronic commerce (EC) has numerous advantages. It allows saving time when we purchase an item, offers the possibility of review without depending on the schedules of traditional stores, access to a wider variety and quantity of articles, in many cases, with lower prices, etc. Based upon mathematical epidemiology tenets strongly related to social behavior able to describe the influence of peers, in this paper we propose an age-group dynamic model with population varying size based on a system of difference equations to study the evolution of the frequent users of EC over time in Spain. Using data from surveys retrieved from the Spanish National Statistics Institute, we use and design computational algorithms to perform a probabilistic estimation of the model parameters that allow the model output to capture the data uncertainty. Then, we will be able to perform a precise prediction with uncertainty.This work has been partially supported by the Ministerio de Economia y Competitividad grant MTM2017-89664-P and by the European Union through the Operational Program of the European Regional Development Fund (ERDF)/European Social Fund (ESF) of the Valencian Community 2014-2020, grants GJIDI/2018/A/009 and GJIDI/2018/A/010.Burgos-Simon, C.; CortĂ©s, J.; MartĂnez-RodrĂguez, D.; Villanueva MicĂł, RJ. (2019). Computational modelling with uncertainty of frequent users of e-commerce in Spain using an age-group dynamic nonlinear model with varying size population. Advances in Complex Systems. 22(4):1950009-1-1950009-17. https://doi.org/10.1142/S0219525919500097S1950009-11950009-17224Bettencourt, L. (1997). Customer voluntary performance: Customers as partners in service delivery. Journal of Retailing, 73(3), 383-406. doi:10.1016/s0022-4359(97)90024-5Brauer, F., & Castillo-Chávez, C. (2001). Mathematical Models in Population Biology and Epidemiology. Texts in Applied Mathematics. doi:10.1007/978-1-4757-3516-1CortĂ©s, J.-C., Lombana, I.-C., & Villanueva, R.-J. (2010). Age-structured mathematical modeling approach to short-term diffusion of electronic commerce in Spain. Mathematical and Computer Modelling, 52(7-8), 1045-1051. doi:10.1016/j.mcm.2010.02.030Hethcote, H. W. (2000). The Mathematics of Infectious Diseases. SIAM Review, 42(4), 599-653. doi:10.1137/s0036144500371907Yanhui, L., & Siming, Z. (2007). Competitive dynamics of e-commerce web sites. Applied Mathematical Modelling, 31(5), 912-919. doi:10.1016/j.apm.2006.03.029Mahajan, V., Muller, E., & Bass, F. M. (1991). New Product Diffusion Models in Marketing: A Review and Directions for Research. Diffusion of Technologies and Social Behavior, 125-177. doi:10.1007/978-3-662-02700-4_6Turban, E., Outland, J., King, D., Lee, J. K., Liang, T.-P., & Turban, D. C. (2018). Electronic Commerce 2018. Springer Texts in Business and Economics. doi:10.1007/978-3-319-58715-
- …