Filters








3,062 Hits in 4.0 sec

Generation of Integration Tests for Self-Testing Components [chapter]

Leonardo Mariani, Mauro Pezzè, David Willmor
2004 Lecture Notes in Computer Science  
Internet software tightly integrates classic computation with communication software.  ...  I/O Invariant Modification: we incrementally add observed behaviors whose execution results in the modification of an I/O Invariant.  ...  We derive Interaction Invariants both statically and dynamically. We statically generate Interaction Invariants by building a reduced control-flow graph where nodes represent services requests.  ... 
doi:10.1007/978-3-540-30233-9_25 fatcat:h5ishuhp3jcbrjxsyw3ez2sucm

Type-Based Access Control in Data-Centric Systems [chapter]

Luís Caires, Jorge A. Pérez, João Costa Seco, Hugo Torres Vieira, Lúcio Ferrão
2011 Lecture Notes in Computer Science  
In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing.  ...  We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.  ...  (uid) and Friends(userid,uid); write where Auth(userid); entity Friend [ user: string; friend: string; ] invariant Friends(user,friend) write where Auth(user) Fig. 1.  ... 
doi:10.1007/978-3-642-19718-5_8 fatcat:h747nyvs6jhgre2prtrwrruu6y

Partial Redundancy and Morphological Homeostasis: Reliable Development through Overlapping Mechanisms

Micah Brodsky
2016 Artificial Life  
The challenges of the underlying physics force the introduction of closed-loop controllers for both spatial patterning and geometric structure.  ...  Reliable development is achieved not through elaborate control procedures or exact solutions, but through crude layering of independent, overlapping mechanisms.  ...  Sussman and supported in part by the National Science Foundation under Grant No. CNS-1116294 and by a grant from Google.  ... 
doi:10.1162/artl_a_00216 pmid:27824497 fatcat:zczu3k2aozgd3mnp5inncd2uaa

Partial Redundancy and Morphological Homeostasis: Reliable Development through Overlapping Mechanisms

Micah Brodsky
2015 07/20/2015-07/24/2015  
The challenges of the underlying physics force the introduction of closed-loop controllers for both spatial patterning and geometric structure.  ...  Reliable development is achieved not through elaborate control procedures or exact solutions, but through crude layering of independent, overlapping mechanisms.  ...  Sussman and supported in part by the National Science Foundation under Grant No. CNS-1116294 and by a grant from Google.  ... 
doi:10.7551/978-0-262-33027-5-ch013 dblp:conf/ecal/Brodsky15 fatcat:hdcf3kolmnfizbab3fyf3zdbxq

Superstring theories [article]

Constantin Bachas, Jan Troost
2006 arXiv   pre-print
Figure 1 : 1 A four-particle and a four-string interaction that are invariant under orientation reversal (ζ + ↔ ζ − ).  ...  Open strings must also be invariant under this flip, and can furthermore carry pointlike (Chan-Paton) charges at their two endpoints.  ... 
arXiv:physics/0605105v1 fatcat:hrplnuii6ncrjiovtuasiqxwfm

Efficient memory safety for TinyOS

Nathan Cooprider, Will Archer, Eric Eide, David Gay, John Regehr
2007 Proceedings of the 5th international conference on Embedded networked sensor systems - SenSys '07  
Our contributions include showing that aggressive optimizations can make safe execution practical in terms of resource usage; developing a technique for efficiently enforcing safety under interrupt-driven  ...  This material is based upon work supported by the National Science Foundation under Grant Nos. 0448047, 0410285, and 0615367.  ...  in order to preserve Deputy's safety invariants.  ... 
doi:10.1145/1322263.1322283 dblp:conf/sensys/CoopriderAEGR07 fatcat:55mti2ypgnhenl2yumgwjyrkna

Considering Typestate Verification for Quantified Event Automata [chapter]

Giles Reger
2016 Lecture Notes in Computer Science  
There exist effective static analysis techniques for checking typestate properties and this has been an area of research since typestates were first introduced in 1986.  ...  This concept is, therefore, tightly related to aliasing.  ...  In a setting where the starting point is dynamic analysis, any imprecision should be dealt with at runtime i.e. if a violation is detected due to an over or under approximation then the runtime checks  ... 
doi:10.1007/978-3-319-47166-2_33 fatcat:lkvxzuv3d5hcbbstxhdxbet5t4

How far are we from the quantum theory of gravity? [article]

Lee Smolin
2003 arXiv   pre-print
At the same time, important issues about loop quantum gravity are so far unresolved, as are key conjectures of string theory.  ...  However, there is a reasonable expectation that experimental tests of lorentz invariance at Planck scales may in the near future make it possible to rule out one or more candidate quantum theories of gravity  ...  include Giovanni Institute for the open, critical, but friendly atmosphere which was so helpful in preparing this review and especially to Frederic Leblond for an inviation to present this work at the PI string  ... 
arXiv:hep-th/0303185v2 fatcat:5y5il7c2f5cihb7hoeoim2ho54

Deformations of anti-de Sitter black holes [article]

Stephane Detournay
2006 arXiv   pre-print
In the same context, we investigate the question of invariant deformations of the hyperbolic plane and present explicit formulae.  ...  On the other hand, we explore the moduli space of the (orbifolded) SL(2,R) WZW model by studying its marginal deformations, yielding namely a new class of exact black string solutions in string theory.  ...  Lorentz invariance is no longer manifest and has to be controlled using the generators of the Poincaré group.  ... 
arXiv:hep-th/0611031v1 fatcat:6ga7okbykzhqlivoujnwalsnmy

$F$-regularity, test elements, and smooth base change

Melvin Hochster, Craig Huneke
1994 Transactions of the American Mathematical Society  
for tight closure is developed in §6 and is then applied in §7 to prove that both tight closure and F-regularity commute with smooth base change under many circumstances (where "smooth" is used to mean  ...  It is shown in §7 that if S is a flat /{-algebra with regular fibers and R is F-regular then S is F-regular.  ...  (b) Proof, (a) J is a radical ideal of S invariant under all automorphisms of S. We shall prove that such an ideal has one of the two forms specified.  ... 
doi:10.1090/s0002-9947-1994-1273534-x fatcat:hz4nj7nbhnfntp3mdojolvgjfm

A Graph Theoretic Approach to Software Watermarking [chapter]

Ramarathnam Venkatesan, Vijay Vazirani, Saurabh Sinha
2001 Lecture Notes in Computer Science  
Our approach works with control/data flow graphs and uses abstractions, approximate k-partitions, and a random walk method to embed the watermark, with the goal of minimizing and controlling the additions  ...  Under some natural assumptions about the code added to embed the WM, locating the WM by an attacker is related to some graph approximation problems.  ...  A vertex invariant is a property of a vertex that does not change under an automorphism. The degree is such a property. k-neighborhood size is another.  ... 
doi:10.1007/3-540-45496-9_12 fatcat:qflfbaaatraz5o2vjfc5pv5bb4

The anomaly that was not meant IIB [article]

Arun Debray, Markus Dierigl, Jonathan J. Heckman, Miguel Montero
2021 arXiv   pre-print
In this paper we explicitly compute these, and present the bordism group that controls them, modulo some physically motivated assumptions.  ...  Remarkably, a subtle modification of the standard 10d Chern-Simons term cancels these anomalies, a fact which relies on the ***specific*** field content of type IIB supergravity.  ...  For the first factor in (3.15) the relevant value is given by τ = i, which is invariant under Ŝ. For the second factor in (3.15) one has τ = e 2πi/3 invariant under Û .  ... 
arXiv:2107.14227v2 fatcat:jjiylbboubf5ndzlc6wb65p4v4

Duality Symmetric String and M-Theory [article]

David S. Berman, Daniel C. Thompson
2014 arXiv   pre-print
We review recent developments in duality symmetric string theory.  ...  We begin with the world sheet doubled formalism which describes strings in an extended space time with extra coordinates conjugate to winding modes.  ...  checks that the double string passes at the quantum level.  ... 
arXiv:1306.2643v2 fatcat:2x4276pkanfdji4qmqsm6ijc6u

Duality symmetric string and M-theory

David S. Berman, Daniel C. Thompson
2015 Physics reports  
We review recent developments in duality symmetric string theory.  ...  We begin with the worldsheet doubled formalism which describes strings in an extended spacetime with extra coordinates conjugate to winding modes.  ...  checks that the double string passes at the quantum level.  ... 
doi:10.1016/j.physrep.2014.11.007 fatcat:f6dyci5aavckjifxsxpbbv67ia

PROGRAM DIFFERENTIATION

DANIEL CHANG, STEPHEN HINES, PAUL WEST, GARY TYSON, DAVID WHALLEY
2012 Journal of Circuits, Systems and Computers  
By modifying aspects of the application control flow, we allow portions of an application executable to be permuted into unique versions for each distributed instance.  ...  Differentiation is achieved using hardware and systems software modifications that are amenable to and scalable in embedded systems.  ...  By requiring a program to execute any or all of these micro state machines, the integrity of program behavior can be checked outside of the regular program execution.  ... 
doi:10.1142/s0218126612400075 fatcat:hvck7n25pbhajn4y6ukplmocji
« Previous Showing results 1 — 15 out of 3,062 results