386 research outputs found

    Antichain cutsets of strongly connected posets

    Full text link
    Rival and Zaguia showed that the antichain cutsets of a finite Boolean lattice are exactly the level sets. We show that a similar characterization of antichain cutsets holds for any strongly connected poset of locally finite height. As a corollary, we get such a characterization for semimodular lattices, supersolvable lattices, Bruhat orders, locally shellable lattices, and many more. We also consider a generalization to strongly connected hypergraphs having finite edges.Comment: 12 pages; v2 contains minor fixes for publicatio

    Structurally Defined Conditional Data-Flow Static Analysis

    Get PDF
    Data flow analysis (DFA) is an important verification technique that computes the effect of data values propagating over program paths. While more precise than flow-insensitive analyses, such an analysis is time-consuming. This paper investigates the acceleration of DFA by structural decomposition of the underlying control flow graph. Specifically, we explore the cost and effectiveness of dividing program paths into subsets by partitioning path suffixes at conditional statements, applying a DFA on each subset, and then combining the resulting invariants. This yields a family of independent DFA problems that are solved in parallel and where the partial results of each problem represent safe program invariants. Empirical evaluations reveal that depending on the DFA type and its conditional implementation the invariants for a large fraction of program points can be computed in less time than traditional DFA. This work suggests a strategy for an “anytime DFA” algorithm: computing safe program invariants as the analysis proceeds

    Certified compilation for cryptography: Extended x86 instructions and constant-time verification

    Get PDF
    We present a new tool for the generation and verification of high-assurance high-speed machine-level cryptography implementations: a certified C compiler supporting instruction extensions to the x86. We demonstrate the practical applicability of our tool by incorporating it into supercop: a toolkit for measuring the performance of cryptographic software, which includes over 2000 different implementations. We show i. that the coverage of x86 implementations in supercop increases significantly due to the added support of instruction extensions via intrinsics and ii. that the obtained verifiably correct implementations are much closer in performance to unverified ones. We extend our compiler with a specialized type system that acts at pre-assembly level; this is the first constant-time verifier that can deal with extended instruction sets. We confirm that, by using instruction extensions, the performance penalty for verifiably constant-time code can be greatly reduced.This work is financed by National Funds through the FCT - Fundação para a Ciência e a Tecnologia (Portuguese Foundation for Science and Technology) within the project PTDC/CCI-INF/31698/2017, and by the Norte Portugal Regional Operational Programme (NORTE 2020) under the Portugal 2020 Partnership Agreement, through the European Regional Development Fund (ERDF) and also by national funds through the FCT, within project NORTE-01-0145-FEDER-028550 (REASSURE)

    Characterizing Coherent Wind Structures using Large-Scale Particle Tracking Velocimetry: A Proof-of-Principle Study

    Get PDF
    The following study proposes a two-dimensional large-scale particle tracking velocimetry (LS-PTV) system to characterize coherent wind structures. Seven minutes of LS-PTV data is collected via an apparatus that seeds fog-filled soap bubbles into the wind at a height of 6m from the ground. The LS-PTV data is compared to 20 minutes of data collected concurrently from a wind mast at the same site. The LS-PTV system recorded a mean streamwise velocity of 1.35m/s with a standard deviation of 0.23m/s at a mean height of 2.50m with a standard deviation of 0.7m, which agrees well with the velocity profile measured by the wind mast. Furthermore, the Reynolds stresses measured by the LS-PTV system are found to compare to those measured by the wind mast and by Klebanoff [1] for a canonical turbulent boundary layer. The current study assumes that the centre-of-curvature trajectories of the particle pathlines are representative of the trajectories followed by the spanwise vortices. As a proof-of-principle study, this work has been successful in accurately describing the vortex distribution very near to the ground. However, the trajectories followed by the centres-of- curvat.ure belonging to pathlines concurrently passing through the field-of-view were sporadic and uncorrelated

    Using Bounded Model Checking to Focus Fixpoint Iterations

    Get PDF
    Two classical sources of imprecision in static analysis by abstract interpretation are widening and merge operations. Merge operations can be done away by distinguishing paths, as in trace partitioning, at the expense of enumerating an exponential number of paths. In this article, we describe how to avoid such systematic exploration by focusing on a single path at a time, designated by SMT-solving. Our method combines well with acceleration techniques, thus doing away with widenings as well in some cases. We illustrate it over the well-known domain of convex polyhedra

    A formally verified compiler back-end

    Get PDF
    This article describes the development and formal verification (proof of semantic preservation) of a compiler back-end from Cminor (a simple imperative intermediate language) to PowerPC assembly code, using the Coq proof assistant both for programming the compiler and for proving its correctness. Such a verified compiler is useful in the context of formal methods applied to the certification of critical software: the verification of the compiler guarantees that the safety properties proved on the source code hold for the executable compiled code as well

    Informal “Seed” Systems and the Management of Gene Flow in Traditional Agroecosystems: The Case of Cassava in Cauca, Colombia

    Get PDF
    Our ability to manage gene flow within traditional agroecosystems and their repercussions requires understanding the biology of crops, including farming practices' role in crop ecology. That these practices' effects on crop population genetics have not been quantified bespeaks lack of an appropriate analytical framework. We use a model that construes seed-management practices as part of a crop's demography to describe the dynamics of cassava (Manihot esculenta Crantz) in Cauca, Colombia. We quantify several management practices for cassava—the first estimates of their kind for a vegetatively-propagated crop—describe their demographic repercussions, and compare them to those of maize, a sexually-reproduced grain crop. We discuss the implications for gene flow, the conservation of cassava diversity, and the biosafety of vegetatively-propagated crops in centers of diversity. Cassava populations are surprisingly open and dynamic: farmers exchange germplasm across localities, particularly improved varieties, and distribute it among neighbors at extremely high rates vis-à-vis maize. This implies that a large portion of cassava populations consists of non-local germplasm, often grown in mixed stands with local varieties. Gene flow from this germplasm into local seed banks and gene pools via pollen has been documented, but its extent remains uncertain. In sum, cassava's biology and vegetative propagation might facilitate pre-release confinement of genetically-modified varieties, as expected, but simultaneously contribute to their diffusion across traditional agroecosystems if released. Genetically-modified cassava is unlikely to displace landraces or compromise their diversity; but rapid diffusion of improved germplasm and subsequent incorporation into cassava landraces, seed banks or wild populations could obstruct the tracking and eradication of deleterious transgenes. Attempts to regulate traditional farming practices to reduce the risks could compromise cassava populations' adaptive potential and ultimately prove ineffectual

    Ambivalence towards discourse of disaster resilience

    Get PDF
    This paper investigates empirically how the international aid community (IAC)—donors and practitioners—considers and implements disaster resilience in a specific country setting, Nepal, and throughout the rest of the world. A key finding is that there is ambivalence about a concept that has become a discourse. On a global level, the IAC utilises the discourse of resilience in a cautiously positive manner as a bridging concept. On a national level, it is being used to influence the Government of Nepal, as well as serving as an operational tool of donors. The mythical resilient urban community is fashioned in the IAC's imaginary; understanding how people create communities and what type of linkages with government urban residents desire to develop their resilience strategies is missing, though, from the discussion. Disaster resilience can be viewed as another grand plan to enhance the lives of people. Yet, regrettably, an explicit focus on individuals and their communities is lost in the process
    • …
    corecore