1,809 research outputs found

    Reachability under Contextual Locking

    Full text link
    The pairwise reachability problem for a multi-threaded program asks, given control locations in two threads, whether they can be simultaneously reached in an execution of the program. The problem is important for static analysis and is used to detect statements that are concurrently enabled. This problem is in general undecidable even when data is abstracted and when the threads (with recursion) synchronize only using a finite set of locks. Popular programming paradigms that limit the lock usage patterns have been identified under which the pairwise reachability problem becomes decidable. In this paper, we consider a new natural programming paradigm, called contextual locking, which ties the lock usage to calling patterns in each thread: we assume that locks are released in the same context that they were acquired and that every lock acquired by a thread in a procedure call is released before the procedure returns. Our main result is that the pairwise reachability problem is polynomial-time decidable for this new programming paradigm as well. The problem becomes undecidable if the locks are reentrant; reentrant locking is a \emph{recursive locking} mechanism which allows a thread in a multi-threaded program to acquire the reentrant lock multiple times.Comment: A preliminary version appears in TACAS 201

    Agricultural growth and structural changes in the Punjab economy: an input-output analysis

    Get PDF
    Agriculture Economic aspects India Punjab., Punjab (India) Economic conditions., Input-output analysis India Punjab.,

    A Rational Approach to Cryptographic Protocols

    Full text link
    This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model the latters as the formers. One of the main advantages of analysing a cryptographic protocol in the game-theory setting is the possibility of describing improved and stronger cryptographic solutions because possible adversarial behaviours may be taken into account directly. With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries

    Reachability for dynamic parametric processes

    Full text link
    In a dynamic parametric process every subprocess may spawn arbitrarily many, identical child processes, that may communicate either over global variables, or over local variables that are shared with their parent. We show that reachability for dynamic parametric processes is decidable under mild assumptions. These assumptions are e.g. met if individual processes are realized by pushdown systems, or even higher-order pushdown systems. We also provide algorithms for subclasses of pushdown dynamic parametric processes, with complexity ranging between NP and DEXPTIME.Comment: 31 page

    Inclusion parameters of pioglitazone hydrochloride and glipizide with β-cyclodextrin and its methyl derivative: calorimetric and

    Get PDF
    Solution calorimetry, a direct method to determine the thermodynamic parameters was used to investigate the inclusion phenomenon (stability constant, K; complexation enthalpy, ΔHo) of two poorly soluble oral hypoglycemic agents, pioglitazone hydrochloride  (pioglitazone HCl) and glipizide with ß- cyclodextrin (ß-CD) and its methyl derivative (methyl-ß-CD). The inclusion complexes prepared by kneading were characterized in the solid state by differential scanning calorimetry and X-ray powder diffraction. The host-guest geometry and stoichiometry for the complexes indicated by proton NMR studies was confirmed by solution calorimetry. In case of pioglitazone HCl, two types of 1:1 complexes co-existing in solution have been revealed as pyridine ring as well as thiazoledione ring can be included in the cavity of cyclodextrin. The value of K1 and K2 determined using two class binding model utilizing non-linear least square regression was found to be 1940 M-1 and 1478 M-1 at pH 8 for complex with ß-CD. Glipizide, a bigger molecule showed 1:2 complex with ß-CD with a stability constant of 1880 M-1 at pH 8 with ß-CD. The magnitude of equilibrium constants decreased at pH 4 which is attributed to the presence of ionized species for both the drug molecules at lower pH. The inclusion of the drugs in the cyclodextrin cavity is an exothermic process accompanied by small negative value of ΔGo and positive value of ΔSo. The magnitude of equilibrium constant increased with the use of methyl-ß-CD for both drugs indicating their better complexing ability. This supports the enhanced solubility and dissolution rates observed with methyl-ß-CD.© 2010 International Formulae Group. All rights reserved.Keywords: Pioglitazone, glipizide, encapsulation, solubility, calorimetry, equilibrium constant

    Face Recognition Using Discrete Cosine Transform for Global and Local Features

    Full text link
    Face Recognition using Discrete Cosine Transform (DCT) for Local and Global Features involves recognizing the corresponding face image from the database. The face image obtained from the user is cropped such that only the frontal face image is extracted, eliminating the background. The image is restricted to a size of 128 x 128 pixels. All images in the database are gray level images. DCT is applied to the entire image. This gives DCT coefficients, which are global features. Local features such as eyes, nose and mouth are also extracted and DCT is applied to these features. Depending upon the recognition rate obtained for each feature, they are given weightage and then combined. Both local and global features are used for comparison. By comparing the ranks for global and local features, the false acceptance rate for DCT can be minimized.Comment: face recognition; biometrics; person identification; authentication; discrete cosine transform; DCT; global local features; Proceedings of the 2011 International Conference on Recent Advancements in Electrical, Electronics and Control Engineering (IConRAEeCE) IEEE Xplore: CFP1153R-ART; ISBN: 978-1-4577-2149-

    Formal Analysis of V2X Revocation Protocols

    Get PDF
    Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy. Typically, the security analysis of these proposals has largely been informal. However, formal analysis can be used to expose flaws and ultimately provide a higher level of assurance in the protocols. This paper focusses on the formal analysis of a particular element of security mechanisms for V2X found in many proposals: the revocation of malicious or misbehaving vehicles from the V2X system by invalidating their credentials. This revocation needs to be performed in an unlinkable way for vehicle privacy even in the context of vehicles regularly changing their pseudonyms. The REWIRE scheme by Forster et al. and its subschemes BASIC and RTOKEN aim to solve this challenge by means of cryptographic solutions and trusted hardware. Formal analysis using the TAMARIN prover identifies two flaws with some of the functional correctness and authentication properties in these schemes. We then propose Obscure Token (OTOKEN), an extension of REWIRE to enable revocation in a privacy preserving manner. Our approach addresses the functional and authentication properties by introducing an additional key-pair, which offers a stronger and verifiable guarantee of successful revocation of vehicles without resolving the long-term identity. Moreover OTOKEN is the first V2X revocation protocol to be co-designed with a formal model.Comment: 16 pages, 4 figure

    Amorphous, Self-Healed (ASH-G) geopolymer and (ASH-C) ceramic composites

    Get PDF
    Basalt is a common volcanic rock found all around the world and on Mars. The abundance of basalt has attracted attention from construction firms and material researchers as an alternative reinforcement source. Potassium geopolymer in the stoichiometric composition K2O • Al2O3 • 4SiO2 • 11H2O was produced from fumed silica, deionized water, potassium hydroxide, (i.e. water glass) and metakaolin. The geopolymer matrix was fabricated in an IKA® high shear mixer. ½” chopped basalt fibers from Kameny Vek in Moscow were added to potassium geopolymer in amounts of 7.5 wt %. The basalt fibers and 7.5 wt % glass frit (900°C) were then dispersed in KGP using a planetary high shear Thinky mixer and the samples were allowed to set under applied pressure at ambient temperatures for 1 day followed by 1 day at 50°C to complete the reaction. A low melting temperature fine glass frit (Tm = 900°C) was added to produce self-sealing/crack filling in a dehydrated but un-crystallized geopolymer composite (900-1000 °C). Sample geometries were 1” x 1” x 6” in dimensions. Six samples from each basalt weight class were heated to 400, 800, 900, 1000, 1100, and 1200 °C. The ramp up and down rates were 7 °C/min with a 1 hour soak time at each set temperature. SEM/EDS data indicated that melting and bonding of the glass phase dispersed into the surrounding KGP matrix, produced a self-sealing effect on the dehydrated and cracked matrix. The chopped basalt fibers melted after the KGP matrix crystallized into leucite, providing a network/glass filling system in a ceramic (1200 °C). At intermediate temperatures the geopolymer was converted to a ceramic, but the basalt fibers remained intact. The amorphous self-healing effect of the glass frit significantly improved to the flexure strength of the geopolymer and ceramic composite

    Observation of the Cabibbo-suppressed charmed baryon decay Λ_c^+→pφ

    Get PDF
    We report the observation of the Cabibbo-suppressed decays Λ_c^+→pK^-K^+ and Λ_c^+→pφ using data collected with the CLEO II detector at CESR. The latter mode, observed for the first time with significant statistics, is of interest as a test of color suppression in charm decays. We have determined the branching ratios for these modes relative to Λ_c^+→pK^-π^+ and compared our results with theory
    • …
    corecore