568 research outputs found
Constraint-based reachability
Iterative imperative programs can be considered as infinite-state systems
computing over possibly unbounded domains. Studying reachability in these
systems is challenging as it requires to deal with an infinite number of states
with standard backward or forward exploration strategies. An approach that we
call Constraint-based reachability, is proposed to address reachability
problems by exploring program states using a constraint model of the whole
program. The keypoint of the approach is to interpret imperative constructions
such as conditionals, loops, array and memory manipulations with the
fundamental notion of constraint over a computational domain. By combining
constraint filtering and abstraction techniques, Constraint-based reachability
is able to solve reachability problems which are usually outside the scope of
backward or forward exploration strategies. This paper proposes an
interpretation of classical filtering consistencies used in Constraint
Programming as abstract domain computations, and shows how this approach can be
used to produce a constraint solver that efficiently generates solutions for
reachability problems that are unsolvable by other approaches.Comment: In Proceedings Infinity 2012, arXiv:1302.310
The Process of Approaching the Taxation of the Exploitation of Personal Data
As pointed out, Harakat M. (2015), in seeking to elucidate the fiscal impact of such or such a measure on economic and social growth, through the evaluation of positive or negative distortions of the tax, it is necessary to take into account the social cost, the tax architecture of security and transparency, in order to satisfy the four maxims, put forward by Smith A. (1776): Proportionality, Stability, Equity, Efficiency. For this, the State has, at the time of the introduction or the re-examination of an instrument of state action, the possibility of examining its appropriateness to know if it has the expected effect, if it is the most effective and the least expensive to achieve the objective fixed by the law or if, on the contrary, other instruments better marketed, would be more appropriate, in reference to the famous duality Equity-Efficiency. This article follows up on our previous work of immersing ourselves in the literature dealing with instruments for taxing the negative externalities of the exploitation of Big Data by Data-Driven-Business-Models, and proposes narrative an overview of the theory of externalities by attempting to draw some lessons from environmental taxation, and then by presenting the various proposals for tax measures on Big Data, in order to prepare ourselves for a better approach to the framework for adopting a tax measure taxing the negative externalities of Big Data in Morocco, which is the subject of our doctoral thesis.
Keywords: Big-Data, Value, Externality, Taxation, Policy Strategies, Free Labour
JEL Classification: F38, H20
Paper type: Theoretical ResearchAs pointed out, Harakat M. (2015), in seeking to elucidate the fiscal impact of such or such a measure on economic and social growth, through the evaluation of positive or negative distortions of the tax, it is necessary to take into account the social cost, the tax architecture of security and transparency, in order to satisfy the four maxims, put forward by Smith A. (1776): Proportionality, Stability, Equity, Efficiency. For this, the State has, at the time of the introduction or the re-examination of an instrument of state action, the possibility of examining its appropriateness to know if it has the expected effect, if it is the most effective and the least expensive to achieve the objective fixed by the law or if, on the contrary, other instruments better marketed, would be more appropriate, in reference to the famous duality Equity-Efficiency. This article follows up on our previous work of immersing ourselves in the literature dealing with instruments for taxing the negative externalities of the exploitation of Big Data by Data-Driven-Business-Models, and proposes narrative an overview of the theory of externalities by attempting to draw some lessons from environmental taxation, and then by presenting the various proposals for tax measures on Big Data, in order to prepare ourselves for a better approach to the framework for adopting a tax measure taxing the negative externalities of Big Data in Morocco, which is the subject of our doctoral thesis.
Keywords: Big-Data, Value, Externality, Taxation, Policy Strategies, Free Labour
JEL Classification: F38, H20
Paper type: Theoretical Researc
On some properties of T0−ordered reflection
[EN] In [12], the authors give an explicit construction of the T0−ordered reflection of an ordered topological space (X, τ,≤) . All ordered topological spaces such that whose T0−ordered reflections are T1−ordered spaces are characterized. In this paper, some properties of the T0−ordered reflection of a given ordered topological space (X, τ,≤) are studies. The class of morphisms in ORDTOP orthogonal to all T0−ordered topological space is characterized.Lazaar, S.; Mhemdi, A. (2014). On some properties of T0−ordered reflection. Applied General Topology. 15(1):43-54. https://doi.org/10.4995/agt.2014.21444354151A. Ayache, O. Echi, The envelope of a subcategory in Topology and group theory, Int. J. Math. Math. Sci. 21 (2005), 3787-3404.Belaid, K., Echi, O., & Lazaar, S. (2004). T(α,β)-spaces and the Wallman compactification. International Journal of Mathematics and Mathematical Sciences, 2004(68), 3717-3735. doi:10.1155/s0161171204404050Casacuberta, C., Frei, A., & Tan, G. C. (1995). Extending localization functors. Journal of Pure and Applied Algebra, 103(2), 149-165. doi:10.1016/0022-4049(94)00099-5A. Deleanu, A. Frei, and P. Hilton, Generalized Adams completion, Cah. Topologie Géom. Différ. Catég.15 (1974), 61-82.R. El Bashir and J. Velebil, Simultaneously reflective and coreflective subcategories of presheaves, Theory Appl. Categ. 10 (2002), 410-423.Freyd, P. J., & Kelly, G. M. (1972). Categories of continuous functors, I. Journal of Pure and Applied Algebra, 2(3), 169-191. doi:10.1016/0022-4049(72)90001-1A. Grothendieck and J. Dieudonné, Eléments de géométrie algébrique, Springer-Verlag (1971).J. M. Harvey, Reflective subcategories, Ill. J. Math. 29 (1985), 365-369.Herrlich, H., & Strecker, G. (1997). Categorical Topology — Its Origins, as Exemplified by the Unfolding of the Theory of Topological Reflections and Coreflections before 1971. History of Topology, 255-341. doi:10.1007/978-94-017-0468-7_15Herrlich, H., & Strecker, G. E. (1968). H-closed spaces and reflective subcategories. Mathematische Annalen, 177(4), 302-309. doi:10.1007/bf01350722Künzi, H.-P. A., & Richmond, T. A. (2005). Ti-ordered reflections. Applied General Topology, 6(2), 207. doi:10.4995/agt.2005.1955H-P. A. Künzi, A. E. Mccluskey and T. A. Richmond, Ordered separation axioms and the Wallman ordered compactification, Publ. Math. Debrecen 73/3-4 (2008), 361-377.Lane, S. M. (1971). Categories for the Working Mathematician. Graduate Texts in Mathematics. doi:10.1007/978-1-4612-9839-7Tholen, W. (1987). Reflective subcategories. Topology and its Applications, 27(2), 201-212. doi:10.1016/0166-8641(87)90105-
Bifurcation Analysis for Prey-Predator Model with Holling Type III Functional Response Incorporating Prey Refuge
In this paper, we carried out the bifurcation analysis for a Lotka-Volterra prey-predator model with Holling type III functional response incorporating prey refuge protecting a constant proportion of the preys. We study the local bifurcation considering the refuge constant as a parameter. From the center manifold equation, we establish a transcritical bifurcation for the boundary equilibrium. In addition, we prove the occurrence of Hopf bifurcation for the homogeneous equilibrium. Moreover, we give the radius and period of the unique limit cycle for our syste
Effect of Feature Selection on Gene Expression Datasets Classification Accurac
Feature selection attracts researchers who deal with machine learning and data mining. It consists of selecting the variables that have the greatest impact on the dataset classification, and discarding the rest. This dimentionality reduction allows classifiers to be fast and more accurate. This paper traits the effect of feature selection on the accuracy of widely used classifiers in literature. These classifiers are compared with three real datasets which are pre-processed with feature selection methods. More than 9% amelioration in classification accuracy is observed, and k-means appears to be the most sensitive classifier to feature selection
Acquiring Qualitative Explainable Graphs for Automated Driving Scene Interpretation
The future of automated driving (AD) is rooted in the development of robust,
fair and explainable artificial intelligence methods. Upon request, automated
vehicles must be able to explain their decisions to the driver and the car
passengers, to the pedestrians and other vulnerable road users and potentially
to external auditors in case of accidents. However, nowadays, most explainable
methods still rely on quantitative analysis of the AD scene representations
captured by multiple sensors. This paper proposes a novel representation of AD
scenes, called Qualitative eXplainable Graph (QXG), dedicated to qualitative
spatiotemporal reasoning of long-term scenes. The construction of this graph
exploits the recent Qualitative Constraint Acquisition paradigm. Our
experimental results on NuScenes, an open real-world multi-modal dataset, show
that the qualitative eXplainable graph of an AD scene composed of 40 frames can
be computed in real-time and light in space storage which makes it a
potentially interesting tool for improved and more trustworthy perception and
control processes in AD
Preuve de validité du vérificateur de code octet Java
L'utilisation du langage Java dans plusieurs environnements (web, systèmes embarqués, systèmes mobiles, etc.) a élevé considérablement le niveau d'exigence envers ce langage, ce qui a amené les chercheurs et les développeurs à s'intéresser au système de sécurité de la Machine Virtuelle Java (MVJ) qui repose principalement sur le vérificateur du code octet. Dans ce mémoire, nous expliquons le fonctionnement du vérificateur Java, son rôle, les différentes techniques proposées pour son implémentation et un algorithme que nous proposons comme alternative sérieuse aux autres vérificateurs qui existent déjà . Nous nous intéresserons plus particulièrement à l'effet des sous-routines sur le bon typage des instructions. Nous présentons aussi une nouvelle approche de vérification de la synchronisation en nous basant sur l'analyse de flot de données et en identifiant les références qui pointent vers le même objet. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : Machine Virtuelle Java, Code octet, Vérificateur, Synchronisation, Java, ClassLoader, Instructions, Treillis, Analyse de flot de données, Fonctions de transfert, Point fixe
Les Big Data A L’emergence Des Data-Driven- Business-Models: Une Synthese De La Litterature
This paper focuses on presenting a first step in a more in-depth literature review. In the border frame of the ‘systemic’ approach (Donnadieu & Karsky, 2002), the study focused on the exploration of ‘Big Data’ value. It follows the process of the formation of the tax decision (Bensouda, 2009) using some properties of the new network apprehension paradigm (Penard, 2014). This is in line with many approaches of identification of the taxable substance of possession and the transmission of ‘value’ (Jemmar, 2010). Also, it is captured exclusively by the ‘shareholder power’ (Vatteville, 2008), using ‘Data-Driven-Business-Models’ (Hartmann et al., 2014). This business model, however, inspired their "Digital Laborer" (Fisher & Fuchs, 2015) based on an activity whose ‘positive externalities’ (Collin & Colin, 2013) go in the form of a "Cognitive Capital" (Boutang, 2007). "Big Data" is indeed the focus of the growing attention in the literature of different disciplines. In addition, it is at the heart of controversies concerning the apprehension by various "stakeholders" who are central to the development of this concept. Based on preliminary research work, this study is aimed at understanding the different dimensions of this Value in the Moroccan context. It also aims to shed light on why its various ‘stakeholders’ are apprehensive regarding this ‘common good’, which escapes real tax measures that can mitigate the ‘negative externalities’ of this new statistical power (Rouvroy & Berns, 2010)
- …