3,710 research outputs found

    Variable elimination for building interpreters

    Get PDF
    In this paper, we build an interpreter by reusing host language functions instead of recoding mechanisms of function application that are already available in the host language (the language which is used to build the interpreter). In order to transform user-defined functions into host language functions we use combinatory logic : lambda-abstractions are transformed into a composition of combinators. We provide a mechanically checked proof that this step is correct for the call-by-value strategy with imperative features.Comment: 33 page

    Conflict, Ideology and Foreign Aid

    Get PDF
    In this paper, we present a rent-seeking model of conflict, which highlights the role of ideology in determining whether the government or the rebels take the initiative. We use the model to interpret the impact of a large-scale Community-Driven Development project on civil conflict in the Philippines. The country is characterized by the presence of two rebel groups, the New People's Army (NPA) and the Moro Islamic Liberation Front (MILF), with two distinct ideologies. We use a unique geo-referenced panel dataset on the occurrence of conflicts in 2003 and 2006 gathered from local newspapers that we match with nationally representative household survey and budget data on all municipalities in the country. Consistent with our model's predictions, using a variety of estimation strategies, we find robust evidence that the project leads to a decline in MILF-related events and to an increase in NPA-related events.Civil Conflict;foreign aid;Rent Seeking;Community-Driven Development;philippines

    Conflict, Ideology and Foreign Aid

    Get PDF
    In this paper, we present a rent-seeking model of conflict, which highlights the role of ideology in determining whether the government or the rebels take the initiative. We use the model to interpret the impact of a large-scale Community-Driven Development project on civil conflict in the Philippines. The country is characterized by the presence of two rebel groups, the New People's Army (NPA) and the Moro Islamic Liberation Front (MILF), with two distinct ideologies. We use a unique geo-referenced panel dataset on the occurrence of conflicts in 2003 and 2006 gathered from local newspapers that we match with nationally representative household survey and budget data on all municipalities in the country. Consistent with our model's predictions, using a variety of estimation strategies, we find robust evidence that the project leads to a decline in MILF-related events and to an increase in NPA-related events.Civil Conflict, foreign aid, Rent Seeking, Community-Driven Development, philippines

    Idiopathic pulmonary fibrosis

    Full text link
    peer reviewedIdiopathic pulmonary fibrosis (IPF) is one of the multiple pathologies included in the large family of diffuse interstitial parenchymal lung diseases (IPD). The latter represent a large group of about 200 different diseases, most of which are orphan diseases. Recently, some new therapeutic options have appeared that require an early and accurate diagnosis of pulmonary fibrosis

    Use of resonance Raman spectroscopy to study the phase diagram of PbZr0.52Ti0.48O3

    Full text link
    Evidence is presented for the first time that the sharp and continuous spectral changes observed in PbZr0.52Ti0.48O3 (PZT) between 350 and 10 K with the 647.1 nm wavelength are due to a resonance Raman effect. Such a phenomenon can be explained by means of a self-trapped exciton emission oxygen deficient complex (TiTi' - VO-) of PZT powder whose energy is close to the radiation line of the laser. This kind of approach should also be very useful to distinguish the phase transition sequence for other related ferro/ piezoelectric systems

    Conflict, Ideology and Foreign Aid

    Get PDF
    In this paper, we present a rent-seeking model of conflict, which highlights the role of ideology in determining whether the government or the rebels take the initiative. We use the model to interpret the impact of a large-scale Community-Driven Development project on civil conflict in the Philippines. The country is characterized by the presence of two rebel groups, the New People's Army (NPA) and the Moro Islamic Liberation Front (MILF), with two distinct ideologies. We use a unique geo-referenced panel dataset on the occurrence of conflicts in 2003 and 2006 gathered from local newspapers that we match with nationally representative household survey and budget data on all municipalities in the country. Consistent with our model's predictions, using a variety of estimation strategies, we find robust evidence that the project leads to a decline in MILF-related events and to an increase in NPA-related events

    Combined Software and Hardware Attacks on the Java Card Control Flow

    Get PDF
    Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the security of its model. On the one hand, the byte code verifier (BCV) checks, during an applet installation, if the Java Card security model is ensured. This mechanism may not be present in the card. On the other hand, the firewall dynamically checks if there is no illegal access. This paper describes two attacks to modify the Java Card control flow and to execute our own malicious byte code. In the first attack, we use a card without embedded security verifier and we show how it is simple to change the return address of a current function. In the second attack, we consider the hypothesis that the card embeds a partial implementation of a BCV. With the help of a laser beam, we are able to change the execution flow

    List Scheduling: The Price of Distribution

    Get PDF
    Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel and distributed platforms. It is inherently centralized. However, with the increasing number of processors in new parallel platforms, the cost for managing a single centralized list becomes too prohibitive. A suitable approach to reduce the contention is to distribute the list among the computational units. Thus each processor has only a local view of the work to execute. The objective of this work is to study the extra cost that must be paid when the list is distributed among the computational units. We present a general methodology for computing the expected makespan based on the analysis of an adequate potential function which represents the load unbalance between the local lists. It is applied to several scheduling problems, namely, for arbitrary divisible load, for unit independent tasks, for weighted independent tasks and for tasks with dependencies. It is presented in detail for the simplest case of divisible load, and then extended to the other cases
    • …
    corecore