9 research outputs found

    Electromigration-Induced Flow of Islands and Voids on the Cu(001) Surface

    Full text link
    Electromigration-induced flow of islands and voids on the Cu(001) surface is studied at the atomic scale. The basic drift mechanisms are identified using a complete set of energy barriers for adatom hopping on the Cu(001) surface, combined with kinetic Monte Carlo simulations. The energy barriers are calculated by the embedded atom method, and parameterized using a simple model. The dependence of the flow on the temperature, the size of the clusters, and the strength of the applied field is obtained. For both islands and voids it is found that edge diffusion is the dominant mass-transport mechanism. The rate limiting steps are identified. For both islands and voids they involve detachment of atoms from corners into the adjacent edge. The energy barriers for these moves are found to be in good agreement with the activation energy for island/void drift obtained from Arrhenius analysis of the simulation results. The relevance of the results to other FCC(001) metal surfaces and their experimental implications are discussed.Comment: 9 pages, 13 ps figure

    A formally verified compiler back-end

    Get PDF
    This article describes the development and formal verification (proof of semantic preservation) of a compiler back-end from Cminor (a simple imperative intermediate language) to PowerPC assembly code, using the Coq proof assistant both for programming the compiler and for proving its correctness. Such a verified compiler is useful in the context of formal methods applied to the certification of critical software: the verification of the compiler guarantees that the safety properties proved on the source code hold for the executable compiled code as well

    Visualization, simulation and validation for cyber-virtual systems

    No full text
    We present our framework for visualization, simulation and validation of cyber-physical systems in industrial automation during development, operation and maintenance. System models may represent an existing physical part - for example an existing robot installation - and a software simulated part - for example a possible future extension of the physical industrial automation setup. We call such systems cyber-virtual systems. Here, we present our VxLab infrastructure for visualization using combined large screens and its applications in industrial automation. The methodology for simulation and validation motivated in this paper is based on this infrastructure. We are targeting scenarios, where industrial sites which may be in remote locations are modeled, simulated and visualized. Modeling, simulation and the visualization can be done from different locations anywhere in the world. Here, we are also concentrating on software modeling challenges related to cyber-virtual systems and simulation, testing, validation and verification techniques applied to them. Software models of industrial sites require behavioral models of both human and machine oriented aspects such as workflows and the components of the industrial sites such as models for tools, robots, workpieces and other machinery as well as communication and sensor facilities. Furthermore, facilitating collaboration between sites and stakeholders, experts and operators is an important application of our work

    Indexing music by mood: design and integration of an automatic content-based annotator

    No full text
    In the context of content analysis for indexing and retrieval, a method for creating automatic music mood annotation is presented. The method is based on results from psychological studies and framed into a supervised learning approach using musical features automatically extracted from the raw audio signal. We present here some of the most relevant audio features to solve this problem. A ground truth, used for training, is created using both social network information systems (wisdom of crowds) and individual experts (wisdom of the few). At the experimental level, we evaluate our approach on a database of 1,000 songs. Tests of different classification methods, configurations and optimizations have been conducted, showing that Support Vector Machines perform best for the task at hand. Moreover, we evaluate the algorithm robustness against different audio compression schemes. This fact, often neglected, is fundamental to build a system that is usable in real conditions. In addition, the integration of a fast and scalable version of this technique with the European Project PHAROS is discussed. This real world application demonstrates the usability of this tool to annotate large-scale databases. We also report on a user evaluation in the context of the PHAROS search engine, asking people about the utility, interest and innovation of this technology in real world use cases.This research has been partially funded by the EU Project PHAROS IST-2006-045035

    On the Runtime Enforcement of Timed Properties

    Get PDF
    International audienceRuntime enforcement refers to the theories, techniques, and tools for enforcing correct behavior of systems at runtime. We are interested in such behaviors described by specifications that feature timing constraints formalized in what is generally referred to as timed properties. This tutorial presents a gentle introduction to runtime enforcement (of timed properties). First, we present a taxonomy of the main principles and concepts involved in runtime enforcement. Then, we give a brief overview of a line of research on theoretical runtime enforcement where timed properties are described by timed automata and feature uncontrollable events. Then, we mention some tools capable of runtime enforcement, and we present the TiPEX tool dedicated to timed properties. Finally, we present some open challenges and avenues for future work. Runtime Enforcement (RE) is a discipline of computer science concerned with enforcing the expected behavior of a system at runtime. Runtime enforcement extends the traditional runtime verification [12-14, 42, 43] problem by dealing with the situations where the system deviates from its expected behavior. While runtime verification monitors are execution observers, runtime enforcers are execution modifiers. Foundations for runtime enforcement were pioneered by Schneider in [98] and by Rinard in [95] for the specific case of real-time systems. There are several tutorials and overviews on runtime enforcement for untimed systems [39, 47, 59], but none on the enforcement of timed properties (for real-time systems). In this tutorial, we focus on runtime enforcing behavior described by a timed property. Timed properties account for physical time. They allow expressing constraints on the time that should elapse between (sequences of) events, which is useful for real-time systems when specifying timing constraints between statements, their scheduling policies, the completion of tasks, etc [5, 7, 88, 101, 102]. This tutorial comprises four stages: 1. the presentation of a taxonomy of concepts and principles in RE (Sec. 1); 2. the presentation of a framework for the RE of timed properties where specifications are described by timed automata (preliminary concepts are recalled in Sec. 2, the framework is overviewed in Sec. 3, and presented in more details in Sec. 4); 3. the demonstration of the TiPEX [82] tool implementing the framework (Sec. 5); 4. the description of some avenues for future work (Sec. 6)

    The role of dipeptidylpeptidase-4 inhibitors in management of cardiovascular disease in diabetes; focus on linagliptin

    No full text
    corecore