843 research outputs found

    A formal soundness proof of region-based memory management for object-oriented paradigm.

    Get PDF
    Region-based memory management has been proposed as a viable alternative to garbage collection for real-time applications and embedded software. In our previous work we have developed a region type inference algorithm that provides an automatic compile-time region-based memory management for object-oriented paradigm. In this work we present a formal soundness proof of the region type system that is the target of our region inference. More precisely, we prove that the object-oriented programs accepted by our region type system achieve region-based memory management in a safe way. That means, the regions follow a stack-of-regions discipline and regions deallocation never create dangling references in the store and on the program stack. Our contribution is to provide a simple syntactic proof that is based on induction and follows the standard steps of a type safety proof. In contrast the previous safety proofs provided for other region type systems employ quite elaborate techniques

    Report of the Supersymmetry Theory Working Group

    Full text link
    We provide a mini-guide to some of the possible manifestations of weak scale supersymmetry. For each of six scenarios we provide a brief description of the theoretical underpinnings, the adjustable parameters, a qualitative description of the associated phenomenology at future colliders, comments on how to simulate each scenario with existing event generators.Comment: Report of Snowmass Supersymmetry Theory Working Group; 14 pages plus 3 figures using latex2e and snow2e.cls; this version has corrected a number of typos from the first versio

    The HIPASS Catalogue - II. Completeness, Reliability, and Parameter Accuracy

    Full text link
    The HI Parkes All Sky Survey (HIPASS) is a blind extragalactic HI 21-cm emission line survey covering the whole southern sky from declination -90 to +25. The HIPASS catalogue (HICAT), containing 4315 HI-selected galaxies from the region south of declination +2, is presented in Meyer et al. (2004a, Paper I). This paper describes in detail the completeness and reliability of HICAT, which are calculated from the recovery rate of synthetic sources and follow-up observations, respectively. HICAT is found to be 99 per cent complete at a peak flux of 84 mJy and an integrated flux of 9.4 Jy km/s. The overall reliability is 95 per cent, but rises to 99 per cent for sources with peak fluxes >58 mJy or integrated flux > 8.2 Jy km/s. Expressions are derived for the uncertainties on the most important HICAT parameters: peak flux, integrated flux, velocity width, and recessional velocity. The errors on HICAT parameters are dominated by the noise in the HIPASS data, rather than by the parametrization procedure.Comment: Accepted for publication in MNRAS. 12 pages, 11 figures. Paper with higher resolution figures can be downloaded from http://hipass.aus-vo.or

    An imperative object calculus

    Full text link

    ‘Do i care?’ young adults' recalled experiences of early adolescent overweight and obesity: a qualitative study

    Get PDF
    <p>Objective: Individual behaviour change to reduce obesity requires awareness of, and concern about, weight. This paper therefore describes how young adults, known to have been overweight or obese during early adolescence, recalled early adolescent weight-related awareness and concerns. Associations between recalled concerns and weight-, health- and peer-related survey responses collected during adolescence are also examined.</p> <p>Design: Qualitative semi-structured interviews with young adults; data compared with responses to self-report questionnaires obtained in adolescence.</p> <p>Participants: A total of 35 participants, purposively sub-sampled at age 24 from a longitudinal study of a school year cohort, previously surveyed at ages 11, 13 and 15. Physical measures during previous surveys allowed identification of participants with a body mass index (BMI) indicative of overweight or obesity (based on British 1990 growth reference) during early adolescence. Overall, 26 had been obese, of whom 11 had BMI99.6th centile, whereas 9 had been overweight (BMI=95th–97.9th centile).</p> <p>Measures: Qualitative interview responses describing teenage life, with prompts for school-, social- and health-related concerns. Early adolescent self-report questionnaire data on weight-worries, self-esteem, friends and victimisation (closed questions).</p> <p>Results: Most, but not all recalled having been aware of their overweight. None referred to themselves as having been obese. None recalled weight-related health worries. Recollection of early adolescent obesity varied from major concerns impacting on much of an individual's life to almost no concern, with little relation to actual severity of overweight. Recalled concerns were not clearly patterned by gender, but young adult males recalling concerns had previously reported more worries about weight, lower self-esteem, fewer friends and more victimisation in early adolescence; no such pattern was seen among females. Conclusion: The popular image of the unhappy overweight teenager was not borne out. Many obese adolescents, although well aware of their overweight recalled neither major dissatisfaction nor concern. Weight-reduction behaviours are unlikely in such circumstances.</p&gt

    Factors Affecting a Recently Purchased Handgun’s Risk for Use in Crime under Circumstances That Suggest Gun Trafficking

    Get PDF
    While many handguns are used in crime each year in the USA, most are not. We conducted this study to identify factors present at the time of a handgun’s most recent retail sale that were associated with its subsequent use in crime under circumstances suggesting that the handgun had been trafficked—purchased with the intent of diverting it to criminal use. Handguns acquired in multiple-gun purchases were of particular interest. Using data for 180,321 handguns purchased from federally licensed retailers in California in 1996, we studied attributes of the handguns, the retailers selling them, the purchasers, and the sales transactions. Our outcome measure was a handgun’s recovery by a police agency, followed by a gun ownership trace, conducted by the Bureau of Alcohol, Tobacco, Firearms and Explosives, that determined (a) that the recovery had occurred within 3 years of the handgun’s most recent purchase from a licensed retailer and (b) that the person who possessed the gun when it was recovered by police was not its most recent purchaser. Altogether, 722 handguns were recovered and had trace results that met the additional criteria. Handguns acquired in multiple-gun, same-day transactions were more likely to be traced than were single-purchase handguns (odds ratio [OR] 1.33, 95% confidence intervals [CI] 1.08 to 1.63). This was not the case for multiple-purchase handguns defined more broadly as multiple handguns purchased by one individual over any 30-day period as used in “one-gun-a-month” laws. Bivariate regressions indicated increased risk of a handgun being traced when it sold new for $150 or less (OR 4.28, 95% CI 3.59 to 5.11) or had been purchased by a woman (OR 2.02, 95% CI 1.62 to 2.52). Handguns sold by retailers who also had a relatively high proportion (≄2%) of purchases denied because the prospective purchasers were prohibited from owning firearms were more likely to be traced than were those sold by other retailers (OR 4.09, 95% CI 3.39 to 4.94). These findings persisted in multivariate analyses. Our findings suggest specific strategies for intervention to prevent gun violence

    Antarctic climate, Southern Ocean circulation patterns, and deep water formation during the Eocene

    Get PDF
    We assess early-to-middle Eocene seawater neodymium (Nd) isotope records from seven Southern Ocean deep-sea drill sites to evaluate the role of Southern Ocean circulation in long-term Cenozoic climate change. Our study sites are strategically located on either side of the Tasman Gateway and are positioned at a range of shallow (Nd(t) = −9.3 ± 1.5). IODP Site U1356 off the coast of AdĂ©lie Land, a locus of modern-day Antarctic Bottom Water production, is identified as a site of persistent deep water formation from the early Eocene to the Oligocene. East of the Tasman Gateway an additional local source of intermediate/deep water formation is inferred at ODP Site 277 in the SW Pacific Ocean (ΔNd(t) = −8.7 ± 1.5). Antarctic-proximal shelf sites (ODP Site 1171 and Site U1356) reveal a pronounced erosional event between 49 and 48 Ma, manifested by ~2 ΔNd unit negative excursions in seawater chemistry toward the composition of bulk sediments at these sites. This erosional event coincides with the termination of peak global warmth following the Early Eocene Climatic Optimum and is associated with documented cooling across the study region and increased export of Antarctic deep waters, highlighting the complexity and importance of Southern Ocean circulation in the greenhouse climate of the Eocene

    Needle & knot : binder boilerplate tied up

    No full text
    To lighten the burden of programming language mechanization, many approaches have been developed that tackle the substantial boilerplate which arises from variable binders. Unfortunately, the existing approaches are limited in scope. They typically do not support complex binding forms (such as multi-binders) that arise in more advanced languages, or they do not tackle the boilerplate due to mentioning variables and binders in relations. As a consequence, the human mechanizer is still unnecessarily burdened with binder boilerplate and discouraged from taking on richer languages. This paper presents Knot, a new approach that substantially extends the support for binder boilerplate. Knot is a highly expressive language for natural and concise specification of syntax with binders. Its meta-theory constructively guarantees the coverage of a considerable amount of binder boilerplate for well-formed specifications, including that for well-scoping of terms and context lookups. Knot also comes with a code generator, Needle, that specializes the generic boilerplate for convenient embedding in COQ and provides a tactic library for automatically discharging proof obligations that frequently come up in proofs of weakening and substitution lemmas of type-systems. Our evaluation shows, that Needle & Knot significantly reduce the size of language mechanizations (by 40% in our case study). Moreover, as far as we know, Knot enables the most concise mechanization of the POPLmark Challenge (1a + 2a) and is two-thirds the size of the next smallest. Finally, Knot allows us to mechanize for instance dependentlytyped languages, which is notoriously challenging because of dependent contexts and mutually-recursive sorts with variables
    • 

    corecore