463 research outputs found

    pony - The occam-pi Network Environment

    Get PDF
    Although concurrency is generally perceived to be a `hard' subject, it can in fact be very simple --- provided that the underlying model is simple. The occam-pi parallel processing language provides such a simple yet powerful concurrency model that is based on CSP and the pi-calculus. This paper presents pony, the occam-pi Network Environment. occam-pi and pony provide a new, unified, concurrency model that bridges inter- and intra-processor concurrency. This enables the development of distributed applications in a transparent, dynamic and highly scalable way. The first part of this paper discusses the philosophy behind pony, explains how it is used, and gives a brief overview of its implementation. The second part evaluates pony's performance by presenting a number of benchmarks

    Process-Oriented Collective Operations

    Get PDF
    Distributing process-oriented programs across a cluster of machines requires careful attention to the effects of network latency. The MPI standard, widely used for cluster computation, defines a number of collective operations: efficient, reusable algorithms for performing operations among a group of machines in the cluster. In this paper, we describe our techniques for implementing MPI communication patterns in process-oriented languages, and how we have used them to implement collective operations in PyCSP and occam-pi on top of an asynchronous messaging framework. We show how to make use of collective operations in distributed processoriented applications. We also show how the process-oriented model can be used to increase concurrency in existing collective operation algorithms

    Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities)

    Get PDF
    There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities. Many vulnerabilities are caused by software errors that are created by software developers. Insecure software development practices are common due to a variety of factors, which include inefficiencies within existing knowledge transfer mechanisms based on vulnerability databases (VDBs), software developers perceiving security as an afterthought, and lack of consideration of security as part of the software development lifecycle (SDLC). The resulting communication gap also prevents developers and security experts from successfully sharing essential security knowledge. The cybersecurity community makes their expert knowledge available in forms including vulnerability databases such as CAPEC and CWE, and pattern catalogues such as Security Patterns, Attack Patterns, and Software Fault Patterns. However, these sources are not effective at providing software developers with an understanding of how malicious hackers can exploit vulnerabilities in the software systems they create. As developers are familiar with pattern-based approaches, this paper proposes the use of Vulnerability Anti-Patterns (VAP) to transfer usable vulnerability knowledge to developers, bridging the communication gap between security experts and software developers. The primary contribution of this paper is twofold: (1) it proposes a new pattern template – Vulnerability Anti-Pattern – that uses anti-patterns rather than patterns to capture and communicate knowledge of existing vulnerabilities, and (2) it proposes a catalogue of Vulnerability Anti-Patterns (VAP) based on the most commonly occurring vulnerabilities that software developers can use to learn how malicious hackers can exploit errors in software

    Using multiple GPUs to accelerate string searching for digital forensic analysis

    Get PDF
    String searching within a large corpus of data is an important component of digital forensic (DF) analysis techniques such as file carving. The continuing increase in capacity of consumer storage devices requires corresponding im-provements to the performance of string searching techniques. As string search-ing is a trivially-parallelisable problem, GPGPU approaches are a natural fit – but previous studies have found that local storage presents an insurmountable performance bottleneck. We show that this need not be the case with modern hardware, and demonstrate substantial performance improvements from the use of single and multiple GPUs when searching for strings within a typical forensic disk image

    To boldly go:an occam-π mission to engineer emergence

    Get PDF
    Future systems will be too complex to design and implement explicitly. Instead, we will have to learn to engineer complex behaviours indirectly: through the discovery and application of local rules of behaviour, applied to simple process components, from which desired behaviours predictably emerge through dynamic interactions between massive numbers of instances. This paper describes a process-oriented architecture for fine-grained concurrent systems that enables experiments with such indirect engineering. Examples are presented showing the differing complex behaviours that can arise from minor (non-linear) adjustments to low-level parameters, the difficulties in suppressing the emergence of unwanted (bad) behaviour, the unexpected relationships between apparently unrelated physical phenomena (shown up by their separate emergence from the same primordial process swamp) and the ability to explore and engineer completely new physics (such as force fields) by their emergence from low-level process interactions whose mechanisms can only be imagined, but not built, at the current time

    Understanding tissue morphology: model repurposing using the CoSMoS process

    Get PDF
    We present CoSMoS as a way of structuring thinking on how to reuse parts of an existing model and simulation in a new model and its implementation. CoSMoS provides a lens through which to consider, post-implementation, the assumptions made during the design and implementation of a software simulation of physical interactions in the formation of vascular structures from endothelial cells. We show how the abstract physical model and its software implementation can be adapted for a different problem: the growth of cancer cells under varying environmental perturbations. We identify the changes that must be made to adapt the model to its new context, along with the gaps in our knowledge of the domain that must be filled by wet-lab experimentation when recalibrating the model. Through parameter exploration, we identify the parameters that are critical to the dynamic physical structure of the modelled tissue, and we calibrate these parameters using a series of in vitro experiments. Drawing inspiration from the CoSMoS project structure, we maintain confidence in the repurposed model, and achieve a satisfactory degree of model reuse within our in silico experimental system

    Reduced-rank spatio-temporal modeling of air pollution concentrations in the Multi-Ethnic Study of Atherosclerosis and Air Pollution

    Full text link
    There is growing evidence in the epidemiologic literature of the relationship between air pollution and adverse health outcomes. Prediction of individual air pollution exposure in the Environmental Protection Agency (EPA) funded Multi-Ethnic Study of Atheroscelerosis and Air Pollution (MESA Air) study relies on a flexible spatio-temporal prediction model that integrates land-use regression with kriging to account for spatial dependence in pollutant concentrations. Temporal variability is captured using temporal trends estimated via modified singular value decomposition and temporally varying spatial residuals. This model utilizes monitoring data from existing regulatory networks and supplementary MESA Air monitoring data to predict concentrations for individual cohort members. In general, spatio-temporal models are limited in their efficacy for large data sets due to computational intractability. We develop reduced-rank versions of the MESA Air spatio-temporal model. To do so, we apply low-rank kriging to account for spatial variation in the mean process and discuss the limitations of this approach. As an alternative, we represent spatial variation using thin plate regression splines. We compare the performance of the outlined models using EPA and MESA Air monitoring data for predicting concentrations of oxides of nitrogen (NOx_x)-a pollutant of primary interest in MESA Air-in the Los Angeles metropolitan area via cross-validated R2R^2. Our findings suggest that use of reduced-rank models can improve computational efficiency in certain cases. Low-rank kriging and thin plate regression splines were competitive across the formulations considered, although TPRS appeared to be more robust in some settings.Comment: Published in at http://dx.doi.org/10.1214/14-AOAS786 the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Proximate Composition and Consumer Acceptability of Wheat-Soy Composite Rock Cake

    Get PDF
    Cookies are traditionally made from soft wheat, a cereal, which is cultivated mostly in temperate regions but imported by countries in the tropics with unfavorable climatic conditions to cultivate the cereal. The aim of the study was to determine the proximate composition and consumer acceptability of rock cakes developed from soy flour. Four different products were thus formulated viz., 0%, 20%, 25% and 75% being replaced with soy flour equivalence in each sample. Samples were examined for their proximate composition using AACC, 2000 methods. Sensory evaluation was also conducted under a 7-point hedonic scale, where 1 represented dislike extremely and 7 represented like extremely. Data was analyzed using SPSS v 20 at 95% confidence interval. Proximate composition analysis showed no significant difference between the means of the constituent nutrients measured. However, the proportionate increased percentage fat, fiber and protein; 26+2.45, 2.00+0.28 and 16.80+2.94 respectively, showed the potential effect of soybean flour in the production of rock cakes. The sensory analysis also showed no significant difference at P < 0.05 between the means and according to the hedonic scale evaluation, WSR11, WSR12 and WSR13 composite rock cakes compared to WSR10, the 100% wheat flour rock cake were “moderately liked” and “like very much” that is, between 5.3 to 6.6 by the fifteen semi-trained panelist. In effect, soybean flour could serve as a nutrient fortification raw product component and as well, to be accepted by consumers of pastries. Keywords: Rock cakes, proximate analysis, sensory analysis, consumer acceptability, hedoni
    corecore