412 research outputs found
Study of ISM tracers in galaxies
We collected data for two samples of normal and interacting galaxies for a
total of 2953 galaxies having fluxes in one or more of the following wavebands:
FIR, 21 cm line, CO(1-0) lines and soft X-ray. The large set of data obtained
allowed us to revisit some of the already known relations between the different
tracers of the interstellar medium (ISM), such as the link between the FIR flux
and the CO line emission, the relation between X-ray emission and the blue or
FIR luminosity. The relation lacking from observations for early-type galaxies
has been discussed and explained in detail in the frame of a suitable
theoretical model, obtained by coupling chemo-dynamical N-body simulations with
a dusty spectrophotometric code of population synthesis.Comment: 2 pages, o appear in the Proceedings of the Conf. "From Stars to
Galaxies: Building the Pieces to Build Up the Universe", Vallenari et al.
eds., ASP Conf. Serie
Galaxy evolution in groups. USGC U268 and USGC U376 in the Leo cloud
With the aim of investigating galaxy evolution in nearby galaxy groups, we
analysed the spectral energy distribution of 24 galaxies, members of two groups
in the Leo cloud, USGC U268 and USGC U376. We estimated the ages and stellar
masses of the galaxies by fitting their total apparent magnitudes from
far-ultraviolet to near-infrared with population synthesis models. The
comparison of the results for a subsample of galaxies with smooth particle
hydrodynamic (SPH) simulations with chemo-photometric implementation, shows
that in most cases the estimated stellar masses obtained with the two different
approaches are in good agreement. The kinematical and dynamical analysis
indicates that USGC U268 is in a pre-virial collapse phase while USGC U376 is
likely in a more evolved phase towards virialization.Comment: 16 pages, 6 figures; accepted for publication in Advances in Space
Research, Special Issue: Ultraviolet Astrophysic
A brief tour of formally secure compilation
Modern programming languages provide helpful high-level abstractions and mechanisms (e.g. types, module, automatic memory management) that enforce good programming practices and are crucial when writing correct and secure code. However, the security guarantees provided by such abstractions are not preserved when a compiler translates a source program into object code. Formally secure compilation is an emerging research field concerned with the design and the implementation of compilers that preserve source-level security properties at the object level. This paper presents a short guided tour of the relevant literature on secure compilation. Our goal is to help newcomers to grasp the basic concepts of this field and, for this reason, we rephrase and present the most relevant results in the literature in a common setting
Control-flow flattening preserves the constant-time policy
Obfuscating compilers protect a software by obscuring its meaning and impeding the reconstruction of its original source code. The typical concern when defining such compilers is their robustness against reverse engineering and the performance of the produced code. Little work has been done in studying whether the security properties of a program are preserved under obfuscation. In this paper we start addressing this problem: we consider control-flow flattening, a popular obfuscation technique used in industrial compilers, and a specific security policy, namely constant-time. We prove that this obfuscation preserves the policy, i.e., that every program satisfying the policy still does after the transformation
Editors\u27 Notes
Editors\u27 Notes: Volume 35, Issue
A theory of transaction parallelism in blockchains
Decentralized blockchain platforms have enabled the secure exchange of crypto-assets without the intermediation of trusted authorities. To this purpose, these platforms rely on a peer-to-peer network of byzantine nodes, which collaboratively maintain an append-only ledger of transactions, called blockchain. Transactions represent the actions required by users, e.g. the transfer of some units of crypto-currency to another user, or the execution of a smart contract which distributes crypto-assets according to its internal logic. Part of the nodes of the peer-to-peer network compete to append transactions to the blockchain. To do so, they group the transactions sent by users into blocks, and update their view of the blockchain state by executing these transactions in the chosen order. Once a block of transactions is appended to the blockchain, the other nodes validate it, re-executing the transactions in the same order. The serial execution of transactions does not take advantage of the multi-core architecture of modern processors, so contributing to limit the throughput. In this paper we develop a theory of transaction parallelism for blockchains, which is based on static analysis of transactions and smart contracts. We illustrate how blockchain nodes can use our theory to parallelize the execution of transactions. Initial experiments on Ethereum show that our technique can improve the performance of nodes
- …