8,150 research outputs found

    Working memory and second language development: A complex, dynamic future?

    Get PDF
    Working memory (WM) is inherently dynamic and complex, being a multi-faceted system that links storage and processing components; yet it is widely understood as internal. Hence, in second language (L2) research, its connection to complex dynamic systems theory (CDST) remains underspecified. This paper seeks to bridge a gap between CDST and WM in L2 research. First, definitions of WM are reviewed, along with evidence for its relationship to L2 outcomes. Next, a brief overview of CDST highlights its metatheoretical and methodological implications. Three perspectives are presented to illustrate how WM can be viewed in terms of major tenets in CDST. These consider WM effects as: (1) context-dependent, (2) interrelated with those of other variables, and (3) amenable to change across the lifespan. Despite this reappraisal, numerous challenges remain. Thus, in addition to noting research opportunities, the paper also considers measurement issues, such as the determination of boundaries and selection of appropriate timescales. In closing, while WM studies have shown its influence on L2 proficiency and processing, to more fully understand its dynamic nature, what is needed is further research on the reciprocal influences of bilingual development and changes in WM components, such as control of attention

    Service To Industry By Public Libraries

    Get PDF
    published or submitted for publicatio

    An Improved Algorithm for Generating Database Transactions from Relational Algebra Specifications

    Full text link
    Alloy is a lightweight modeling formalism based on relational algebra. In prior work with Fisler, Giannakopoulos, Krishnamurthi, and Yoo, we have presented a tool, Alchemy, that compiles Alloy specifications into implementations that execute against persistent databases. The foundation of Alchemy is an algorithm for rewriting relational algebra formulas into code for database transactions. In this paper we report on recent progress in improving the robustness and efficiency of this transformation

    Conceptual Design of Software: A Research Agenda

    Get PDF
    A research agenda in software design is outlined, focusing on the role of concepts. The notions of concepts as "abstract affordances" and of conceptual integrity are discussed, and a series of small examples of conceptual models is given

    Real-time Spectroscopy with Sub-GHz Resolution using Amplified Dispersive Fourier Transformation

    Full text link
    Dispersive Fourier transformation is a powerful technique in which spectral information is mapped into the time domain using chromatic dispersion. It replaces a spectrometer with an electronic digitizer, and enables real-time spectroscopy. The fundamental problem in this technique is the trade-off between the detection sensitivity and spectral resolution, a limitation set by the digitizer's bandwidth. This predicament is caused by the power loss associated with optical dispersion. We overcome this limitation using Raman amplified spectrum-to-time transformation. An extraordinary loss-less -11.76 ns/nm dispersive device is used to demonstrate single-shot gas absorption spectroscopy with 950 MHz resolution--a record in real-time spectroscopy.Comment: The following article has been accepted by Applied Physics Letter

    Knowledge Flow Analysis for Security Protocols

    Full text link
    Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely to informal descriptions of protocols, it allows a succinct and natural formalization; because it abstracts away message ordering, and handles communications between principals and applications of cryptographic primitives uniformly, it is readily represented in a standard logic. A generic framework in the Alloy modelling language is presented, and instantiated for two standard protocols, and a new key management scheme.Comment: 20 page

    Molecular Mechanics of Oxaliplatin and an Oxaliplatin Derivative with Their Relevant Biological Targets

    Get PDF
    Molecular mechanics and dynamics calculations were used to simulate reactions of oxaliplatin and Pt(Me2dach)(oxalate) with methionine and guanine, where Me2dach is N,N-dimethyl-1,2-diaminocyclohexane. The results were consistent with steric effects that resulted in chelation when Pt(Me2dach)(oxalate) reacted with N-acetylmethionine experimentally (Williams et al., 2013). The energy difference due to ligand bulk that was predicted using molecular mechanics was also consistent with experimental results: oxaliplatin’s ligand bulk did not prevent the formation of bis products with 9-ethylguanine and N-acetylmethionine, but the ligand bulk of Pt(Me2dach)(oxalate) did prevent bis product formation with N-acetylmethionine, resulting in chelation with the sulfur and oxygen atoms of the methionine residue (Williams et al., 2013).Pt(Me2dach)(oxalate) did not prevent bis products with 9-ethylguanine (Williams et al., 2013)

    Bispectrum signatures of a modified vacuum in single field inflation with a small speed of sound

    Full text link
    Deviations from the Bunch-Davies vacuum during an inflationary period can leave a testable imprint on the higher-order correlations of the CMB and large scale structures in the Universe. The effect is particularly pronounced if the statistical non-Gaussianity is inherently large, such as in models of inflation with a small speed of sound, e.g. DBI. First reviewing the motivations for a modified vacuum, we calculate the non-Gaussianity for a general action with a small speed of sound. The shape of its bispectrum is found to most resemble the 'orthogonal' or 'local' templates depending on the phase of the Bogolyubov parameter. In particular, for DBI models of inflation the bispectrum can have a profound 'local' template feature, in contrast to previous results. Determining the projection into the observational templates allows us to derive constraints on the absolute value of the Bogolyubov parameter. In the small sound speed limit, the derived constraints are generally stronger than the existing constraint derived from the power spectrum. The bound on the absolute value of the Bogolyubov parameter ranges from the 10^-6 to the 10^-3 level for H/\Lambda_c = 10^-3, depending on the specific details of the model, the sound speed and the phase of the Bogolyubov parameter.Comment: 34 pages, 8 figures, 2 appendices. New in this version: added references, fixed typos, modified sentences. Version submitted to JCA

    TriCheck: Memory Model Verification at the Trisection of Software, Hardware, and ISA

    Full text link
    Memory consistency models (MCMs) which govern inter-module interactions in a shared memory system, are a significant, yet often under-appreciated, aspect of system design. MCMs are defined at the various layers of the hardware-software stack, requiring thoroughly verified specifications, compilers, and implementations at the interfaces between layers. Current verification techniques evaluate segments of the system stack in isolation, such as proving compiler mappings from a high-level language (HLL) to an ISA or proving validity of a microarchitectural implementation of an ISA. This paper makes a case for full-stack MCM verification and provides a toolflow, TriCheck, capable of verifying that the HLL, compiler, ISA, and implementation collectively uphold MCM requirements. The work showcases TriCheck's ability to evaluate a proposed ISA MCM in order to ensure that each layer and each mapping is correct and complete. Specifically, we apply TriCheck to the open source RISC-V ISA, seeking to verify accurate, efficient, and legal compilations from C11. We uncover under-specifications and potential inefficiencies in the current RISC-V ISA documentation and identify possible solutions for each. As an example, we find that a RISC-V-compliant microarchitecture allows 144 outcomes forbidden by C11 to be observed out of 1,701 litmus tests examined. Overall, this paper demonstrates the necessity of full-stack verification for detecting MCM-related bugs in the hardware-software stack.Comment: Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating System
    corecore