A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
Generation of Integration Tests for Self-Testing Components
[chapter]
2004
Lecture Notes in Computer Science
Internet software tightly integrates classic computation with communication software. ...
I/O Invariant Modification: we incrementally add observed behaviors whose execution results in the modification of an I/O Invariant. ...
We derive Interaction Invariants both statically and dynamically. We statically generate Interaction Invariants by building a reduced control-flow graph where nodes represent services requests. ...
doi:10.1007/978-3-540-30233-9_25
fatcat:h5ishuhp3jcbrjxsyw3ez2sucm
Type-Based Access Control in Data-Centric Systems
[chapter]
2011
Lecture Notes in Computer Science
In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. ...
We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies. ...
(uid) and Friends(userid,uid); write where Auth(userid); entity Friend [ user: string; friend: string; ] invariant Friends(user,friend)
write where Auth(user)
Fig. 1. ...
doi:10.1007/978-3-642-19718-5_8
fatcat:h747nyvs6jhgre2prtrwrruu6y
Partial Redundancy and Morphological Homeostasis: Reliable Development through Overlapping Mechanisms
2016
Artificial Life
The challenges of the underlying physics force the introduction of closed-loop controllers for both spatial patterning and geometric structure. ...
Reliable development is achieved not through elaborate control procedures or exact solutions, but through crude layering of independent, overlapping mechanisms. ...
Sussman and supported in part by the National Science Foundation under Grant No. CNS-1116294 and by a grant from Google. ...
doi:10.1162/artl_a_00216
pmid:27824497
fatcat:zczu3k2aozgd3mnp5inncd2uaa
Partial Redundancy and Morphological Homeostasis: Reliable Development through Overlapping Mechanisms
2015
07/20/2015-07/24/2015
The challenges of the underlying physics force the introduction of closed-loop controllers for both spatial patterning and geometric structure. ...
Reliable development is achieved not through elaborate control procedures or exact solutions, but through crude layering of independent, overlapping mechanisms. ...
Sussman and supported in part by the National Science Foundation under Grant No. CNS-1116294 and by a grant from Google. ...
doi:10.7551/978-0-262-33027-5-ch013
dblp:conf/ecal/Brodsky15
fatcat:hdcf3kolmnfizbab3fyf3zdbxq
Superstring theories
[article]
2006
arXiv
pre-print
Figure 1 : 1 A four-particle and a four-string interaction that are invariant under orientation reversal (ζ + ↔ ζ − ). ...
Open strings must also be invariant under this flip, and can furthermore carry pointlike (Chan-Paton) charges at their two endpoints. ...
arXiv:physics/0605105v1
fatcat:hrplnuii6ncrjiovtuasiqxwfm
Efficient memory safety for TinyOS
2007
Proceedings of the 5th international conference on Embedded networked sensor systems - SenSys '07
Our contributions include showing that aggressive optimizations can make safe execution practical in terms of resource usage; developing a technique for efficiently enforcing safety under interrupt-driven ...
This material is based upon work supported by the National Science Foundation under Grant Nos. 0448047, 0410285, and 0615367. ...
in order to preserve Deputy's safety invariants. ...
doi:10.1145/1322263.1322283
dblp:conf/sensys/CoopriderAEGR07
fatcat:55mti2ypgnhenl2yumgwjyrkna
Considering Typestate Verification for Quantified Event Automata
[chapter]
2016
Lecture Notes in Computer Science
There exist effective static analysis techniques for checking typestate properties and this has been an area of research since typestates were first introduced in 1986. ...
This concept is, therefore, tightly related to aliasing. ...
In a setting where the starting point is dynamic analysis, any imprecision should be dealt with at runtime i.e. if a violation is detected due to an over or under approximation then the runtime checks ...
doi:10.1007/978-3-319-47166-2_33
fatcat:lkvxzuv3d5hcbbstxhdxbet5t4
How far are we from the quantum theory of gravity?
[article]
2003
arXiv
pre-print
At the same time, important issues about loop quantum gravity are so far unresolved, as are key conjectures of string theory. ...
However, there is a reasonable expectation that experimental tests of lorentz invariance at Planck scales may in the near future make it possible to rule out one or more candidate quantum theories of gravity ...
include Giovanni Institute for the open, critical, but friendly atmosphere which was so helpful in preparing this review and especially to Frederic Leblond for an inviation to present this work at the PI string ...
arXiv:hep-th/0303185v2
fatcat:5y5il7c2f5cihb7hoeoim2ho54
Deformations of anti-de Sitter black holes
[article]
2006
arXiv
pre-print
In the same context, we investigate the question of invariant deformations of the hyperbolic plane and present explicit formulae. ...
On the other hand, we explore the moduli space of the (orbifolded) SL(2,R) WZW model by studying its marginal deformations, yielding namely a new class of exact black string solutions in string theory. ...
Lorentz invariance is no longer manifest and has to be controlled using the generators of the Poincaré group. ...
arXiv:hep-th/0611031v1
fatcat:6ga7okbykzhqlivoujnwalsnmy
$F$-regularity, test elements, and smooth base change
1994
Transactions of the American Mathematical Society
for tight closure is developed in §6 and is then applied in §7 to prove that both tight closure and F-regularity commute with smooth base change under many circumstances (where "smooth" is used to mean ...
It is shown in §7 that if S is a flat /{-algebra with regular fibers and R is F-regular then S is F-regular. ...
(b) Proof, (a) J is a radical ideal of S invariant under all automorphisms of S. We shall prove that such an ideal has one of the two forms specified. ...
doi:10.1090/s0002-9947-1994-1273534-x
fatcat:hz4nj7nbhnfntp3mdojolvgjfm
A Graph Theoretic Approach to Software Watermarking
[chapter]
2001
Lecture Notes in Computer Science
Our approach works with control/data flow graphs and uses abstractions, approximate k-partitions, and a random walk method to embed the watermark, with the goal of minimizing and controlling the additions ...
Under some natural assumptions about the code added to embed the WM, locating the WM by an attacker is related to some graph approximation problems. ...
A vertex invariant is a property of a vertex that does not change under an automorphism. The degree is such a property. k-neighborhood size is another. ...
doi:10.1007/3-540-45496-9_12
fatcat:qflfbaaatraz5o2vjfc5pv5bb4
The anomaly that was not meant IIB
[article]
2021
arXiv
pre-print
In this paper we explicitly compute these, and present the bordism group that controls them, modulo some physically motivated assumptions. ...
Remarkably, a subtle modification of the standard 10d Chern-Simons term cancels these anomalies, a fact which relies on the ***specific*** field content of type IIB supergravity. ...
For the first factor in (3.15) the relevant value is given by τ = i, which is invariant under Ŝ. For the second factor in (3.15) one has τ = e 2πi/3 invariant under Û . ...
arXiv:2107.14227v2
fatcat:jjiylbboubf5ndzlc6wb65p4v4
Duality Symmetric String and M-Theory
[article]
2014
arXiv
pre-print
We review recent developments in duality symmetric string theory. ...
We begin with the world sheet doubled formalism which describes strings in an extended space time with extra coordinates conjugate to winding modes. ...
checks that the double string passes at the quantum level. ...
arXiv:1306.2643v2
fatcat:2x4276pkanfdji4qmqsm6ijc6u
Duality symmetric string and M-theory
2015
Physics reports
We review recent developments in duality symmetric string theory. ...
We begin with the worldsheet doubled formalism which describes strings in an extended spacetime with extra coordinates conjugate to winding modes. ...
checks that the double string passes at the quantum level. ...
doi:10.1016/j.physrep.2014.11.007
fatcat:f6dyci5aavckjifxsxpbbv67ia
PROGRAM DIFFERENTIATION
2012
Journal of Circuits, Systems and Computers
By modifying aspects of the application control flow, we allow portions of an application executable to be permuted into unique versions for each distributed instance. ...
Differentiation is achieved using hardware and systems software modifications that are amenable to and scalable in embedded systems. ...
By requiring a program to execute any or all of these micro state machines, the integrity of program behavior can be checked outside of the regular program execution. ...
doi:10.1142/s0218126612400075
fatcat:hvck7n25pbhajn4y6ukplmocji
« Previous
Showing results 1 — 15 out of 3,062 results