1,115 research outputs found

    Automatic Verification of Erlang-Style Concurrency

    Full text link
    This paper presents an approach to verify safety properties of Erlang-style, higher-order concurrent programs automatically. Inspired by Core Erlang, we introduce Lambda-Actor, a prototypical functional language with pattern-matching algebraic data types, augmented with process creation and asynchronous message-passing primitives. We formalise an abstract model of Lambda-Actor programs called Actor Communicating System (ACS) which has a natural interpretation as a vector addition system, for which some verification problems are decidable. We give a parametric abstract interpretation framework for Lambda-Actor and use it to build a polytime computable, flow-based, abstract semantics of Lambda-Actor programs, which we then use to bootstrap the ACS construction, thus deriving a more accurate abstract model of the input program. We have constructed Soter, a tool implementation of the verification method, thereby obtaining the first fully-automatic, infinite-state model checker for a core fragment of Erlang. We find that in practice our abstraction technique is accurate enough to verify an interesting range of safety properties. Though the ACS coverability problem is Expspace-complete, Soter can analyse these verification problems surprisingly efficiently.Comment: 12 pages plus appendix, 4 figures, 1 table. The tool is available at http://mjolnir.cs.ox.ac.uk/soter

    The Spread of Sleep Loss Influences Drug Use in Adolescent Social Networks

    Get PDF
    Troubled sleep is a commonly cited consequence of adolescent drug use, but it has rarely been studied as a cause. Nor have there been any studies of the extent to which sleep behavior can spread in social networks from person to person to person. Here we map the social networks of 8,349 adolescents in order to study how sleep behavior spreads, how drug use behavior spreads, and how a friend's sleep behavior influences one's own drug use. We find clusters of poor sleep behavior and drug use that extend up to four degrees of separation (to one's friends' friends' friends' friends) in the social network. Prospective regression models show that being central in the network negatively influences future sleep outcomes, but not vice versa. Moreover, if a friend sleeps ≤7 hours, it increases the likelihood a person sleeps ≤7 hours by 11%. If a friend uses marijuana, it increases the likelihood of marijuana use by 110%. Finally, the likelihood that an individual uses drugs increases by 19% when a friend sleeps ≤7 hours, and a mediation analysis shows that 20% of this effect results from the spread of sleep behavior from one person to another. This is the first study to suggest that the spread of one behavior in social networks influences the spread of another. The results indicate that interventions should focus on healthy sleep to prevent drug use and targeting specific individuals may improve outcomes across the entire social network

    A Two-Phase Approach for Conditional Floating-Point Verification

    Get PDF

    Predicting the academic underachievement in high school in Spain over the next few years: A dynamic modelling approach

    Full text link
    [EN] In this paper we propose a dynamic model to understand the evolution of the academic underachievement in a high school in Spain. This model is based on ideas of Christakis and Fowler where individual habits may be transmitted by social contact. Thus, to build the model we suppose that a student has academic failure when she/he gets into study habits transmitted by students with bad academic habits. From the available academic results of the Spanish high school educational system during the period 1999 2008, we fit the model to the data in order to obtain the parameters of the model. Then, we predict the academic underachievement evolution over the next few years.This work has been partially supported by the Spanish M.C.Y.T. grant MTM2009-08587 and the Universitat Politecnica de Valencia grant PAID06-09-2588Camacho Vidal, FJ.; Cortés, J.; Micle, RM.; Sánchez-Sánchez, A. (2013). Predicting the academic underachievement in high school in Spain over the next few years: A dynamic modelling approach. Mathematical and Computer Modelling. 57(7):1703-1708. https://doi.org/10.1016/j.mcm.2011.11.011S1703170857

    A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs

    Full text link
    The actor model is an attractive foundation for developing concurrent applications because actors are isolated concurrent entities that communicate through asynchronous messages and do not share state. Thereby, they avoid concurrency bugs such as data races, but are not immune to concurrency bugs in general. This study taxonomizes concurrency bugs in actor-based programs reported in literature. Furthermore, it analyzes the bugs to identify the patterns causing them as well as their observable behavior. Based on this taxonomy, we further analyze the literature and find that current approaches to static analysis and testing focus on communication deadlocks and message protocol violations. However, they do not provide solutions to identify livelocks and behavioral deadlocks. The insights obtained in this study can be used to improve debugging support for actor-based programs with new debugging techniques to identify the root cause of complex concurrency bugs.Comment: - Submitted for review - Removed section 6 "Research Roadmap for Debuggers", its content was summarized in the Future Work section - Added references for section 1, section 3, section 4.3 and section 5.1 - Updated citation

    Studying Paths of Participation in Viral Diffusion Process

    Full text link
    Authors propose a conceptual model of participation in viral diffusion process composed of four stages: awareness, infection, engagement and action. To verify the model it has been applied and studied in the virtual social chat environment settings. The study investigates the behavioral paths of actions that reflect the stages of participation in the diffusion and presents shortcuts, that lead to the final action, i.e. the attendance in a virtual event. The results show that the participation in each stage of the process increases the probability of reaching the final action. Nevertheless, the majority of users involved in the virtual event did not go through each stage of the process but followed the shortcuts. That suggests that the viral diffusion process is not necessarily a linear sequence of human actions but rather a dynamic system.Comment: In proceedings of the 4th International Conference on Social Informatics, SocInfo 201

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    Your Proof Fails? Testing Helps to Find the Reason

    Full text link
    Applying deductive verification to formally prove that a program respects its formal specification is a very complex and time-consuming task due in particular to the lack of feedback in case of proof failures. Along with a non-compliance between the code and its specification (due to an error in at least one of them), possible reasons of a proof failure include a missing or too weak specification for a called function or a loop, and lack of time or simply incapacity of the prover to finish a particular proof. This work proposes a new methodology where test generation helps to identify the reason of a proof failure and to exhibit a counter-example clearly illustrating the issue. We describe how to transform an annotated C program into C code suitable for testing and illustrate the benefits of the method on comprehensive examples. The method has been implemented in STADY, a plugin of the software analysis platform FRAMA-C. Initial experiments show that detecting non-compliances and contract weaknesses allows to precisely diagnose most proof failures.Comment: 11 pages, 10 figure

    Computational modelling with uncertainty of frequent users of e-commerce in Spain using an age-group dynamic nonlinear model with varying size population

    Full text link
    [EN] Electronic commerce (EC) has numerous advantages. It allows saving time when we purchase an item, offers the possibility of review without depending on the schedules of traditional stores, access to a wider variety and quantity of articles, in many cases, with lower prices, etc. Based upon mathematical epidemiology tenets strongly related to social behavior able to describe the influence of peers, in this paper we propose an age-group dynamic model with population varying size based on a system of difference equations to study the evolution of the frequent users of EC over time in Spain. Using data from surveys retrieved from the Spanish National Statistics Institute, we use and design computational algorithms to perform a probabilistic estimation of the model parameters that allow the model output to capture the data uncertainty. Then, we will be able to perform a precise prediction with uncertainty.This work has been partially supported by the Ministerio de Economia y Competitividad grant MTM2017-89664-P and by the European Union through the Operational Program of the European Regional Development Fund (ERDF)/European Social Fund (ESF) of the Valencian Community 2014-2020, grants GJIDI/2018/A/009 and GJIDI/2018/A/010.Burgos-Simon, C.; Cortés, J.; Martínez-Rodríguez, D.; Villanueva Micó, RJ. (2019). Computational modelling with uncertainty of frequent users of e-commerce in Spain using an age-group dynamic nonlinear model with varying size population. Advances in Complex Systems. 22(4):1950009-1-1950009-17. https://doi.org/10.1142/S0219525919500097S1950009-11950009-17224Bettencourt, L. (1997). Customer voluntary performance: Customers as partners in service delivery. Journal of Retailing, 73(3), 383-406. doi:10.1016/s0022-4359(97)90024-5Brauer, F., & Castillo-Chávez, C. (2001). Mathematical Models in Population Biology and Epidemiology. Texts in Applied Mathematics. doi:10.1007/978-1-4757-3516-1Cortés, J.-C., Lombana, I.-C., & Villanueva, R.-J. (2010). Age-structured mathematical modeling approach to short-term diffusion of electronic commerce in Spain. Mathematical and Computer Modelling, 52(7-8), 1045-1051. doi:10.1016/j.mcm.2010.02.030Hethcote, H. W. (2000). The Mathematics of Infectious Diseases. SIAM Review, 42(4), 599-653. doi:10.1137/s0036144500371907Yanhui, L., & Siming, Z. (2007). Competitive dynamics of e-commerce web sites. Applied Mathematical Modelling, 31(5), 912-919. doi:10.1016/j.apm.2006.03.029Mahajan, V., Muller, E., & Bass, F. M. (1991). New Product Diffusion Models in Marketing: A Review and Directions for Research. Diffusion of Technologies and Social Behavior, 125-177. doi:10.1007/978-3-662-02700-4_6Turban, E., Outland, J., King, D., Lee, J. K., Liang, T.-P., & Turban, D. C. (2018). Electronic Commerce 2018. Springer Texts in Business and Economics. doi:10.1007/978-3-319-58715-
    • …
    corecore