412 research outputs found

    Study of ISM tracers in galaxies

    Get PDF
    We collected data for two samples of normal and interacting galaxies for a total of 2953 galaxies having fluxes in one or more of the following wavebands: FIR, 21 cm line, CO(1-0) lines and soft X-ray. The large set of data obtained allowed us to revisit some of the already known relations between the different tracers of the interstellar medium (ISM), such as the link between the FIR flux and the CO line emission, the relation between X-ray emission and the blue or FIR luminosity. The relation lacking from observations for early-type galaxies has been discussed and explained in detail in the frame of a suitable theoretical model, obtained by coupling chemo-dynamical N-body simulations with a dusty spectrophotometric code of population synthesis.Comment: 2 pages, o appear in the Proceedings of the Conf. "From Stars to Galaxies: Building the Pieces to Build Up the Universe", Vallenari et al. eds., ASP Conf. Serie

    Galaxy evolution in groups. USGC U268 and USGC U376 in the Leo cloud

    Full text link
    With the aim of investigating galaxy evolution in nearby galaxy groups, we analysed the spectral energy distribution of 24 galaxies, members of two groups in the Leo cloud, USGC U268 and USGC U376. We estimated the ages and stellar masses of the galaxies by fitting their total apparent magnitudes from far-ultraviolet to near-infrared with population synthesis models. The comparison of the results for a subsample of galaxies with smooth particle hydrodynamic (SPH) simulations with chemo-photometric implementation, shows that in most cases the estimated stellar masses obtained with the two different approaches are in good agreement. The kinematical and dynamical analysis indicates that USGC U268 is in a pre-virial collapse phase while USGC U376 is likely in a more evolved phase towards virialization.Comment: 16 pages, 6 figures; accepted for publication in Advances in Space Research, Special Issue: Ultraviolet Astrophysic

    A brief tour of formally secure compilation

    Get PDF
    Modern programming languages provide helpful high-level abstractions and mechanisms (e.g. types, module, automatic memory management) that enforce good programming practices and are crucial when writing correct and secure code. However, the security guarantees provided by such abstractions are not preserved when a compiler translates a source program into object code. Formally secure compilation is an emerging research field concerned with the design and the implementation of compilers that preserve source-level security properties at the object level. This paper presents a short guided tour of the relevant literature on secure compilation. Our goal is to help newcomers to grasp the basic concepts of this field and, for this reason, we rephrase and present the most relevant results in the literature in a common setting

    A Two-Component Language for Adaptation: Design, Semantics, and Program Analysis

    Get PDF

    Control-flow flattening preserves the constant-time policy

    Get PDF
    Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction of its original source code. The typical concern when defining such compilers is their robustness against reverse engineering and the performance of the produced code. Little work has been done in studying whether the security properties of a program are preserved under obfuscation. In this paper we start addressing this problem: we consider control-flow flattening, a popular obfuscation technique used in industrial compilers, and a specific security policy, namely constant-time. We prove that this obfuscation preserves the policy, i.e., that every program satisfying the policy still does after the transformation

    Editors\u27 Notes

    Get PDF
    Editors\u27 Notes: Volume 35, Issue

    A theory of transaction parallelism in blockchains

    Get PDF
    Decentralized blockchain platforms have enabled the secure exchange of crypto-assets without the intermediation of trusted authorities. To this purpose, these platforms rely on a peer-to-peer network of byzantine nodes, which collaboratively maintain an append-only ledger of transactions, called blockchain. Transactions represent the actions required by users, e.g. the transfer of some units of crypto-currency to another user, or the execution of a smart contract which distributes crypto-assets according to its internal logic. Part of the nodes of the peer-to-peer network compete to append transactions to the blockchain. To do so, they group the transactions sent by users into blocks, and update their view of the blockchain state by executing these transactions in the chosen order. Once a block of transactions is appended to the blockchain, the other nodes validate it, re-executing the transactions in the same order. The serial execution of transactions does not take advantage of the multi-core architecture of modern processors, so contributing to limit the throughput. In this paper we develop a theory of transaction parallelism for blockchains, which is based on static analysis of transactions and smart contracts. We illustrate how blockchain nodes can use our theory to parallelize the execution of transactions. Initial experiments on Ethereum show that our technique can improve the performance of nodes

    IFCIL: An Information Flow Configuration Language for SELinux

    Get PDF
    • …
    corecore