Filters








27 Hits in 5.0 sec

Table of Contents

2021 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)  
: Control-Data Isolation at Runtime Through Dynamic Binary Modification 86 Camille Le Bon (Univ Rennes, Inria, CNRS, IRISA, France), Erven Rohou (Univ Rennes, Inria, CNRS, IRISA, France), Frédéric Tronel  ...  Borrowed Capabilities: Flexibly Enforcing Revocation on a Capability Architecture 80 Thijs Vercammen (KU Leuven), Thomas Van Strydonck (KU Leuven), and Dominique Devriese (Vrije Universiteit Brussel) Damas  ... 
doi:10.1109/eurospw54576.2021.00004 fatcat:rhy4ar7hhbeq3ejsgz6mrffagy

Building ubiquitous computing applications using the VERSAG adaptive agent framework

Kutila Gunasekera, Arkady Zaslavsky, Shonali Krishnaswamy, Seng Wai Loke
2013 Journal of Systems and Software  
A case study scenario is used to illustrate the functional benefits achievable through the use of this framework in ubiquitous computing environments.  ...  Towards this, we propose VERSAG, a novel agent framework and architecture which combines agent mobility with the ability to dynamically change the internal structure and capabilities of agents and leads  ...  Controller Agent (CA) The Controller Agent (CA) is a special (non-VERSAG) agent developed to conveniently control VERSAG agents through a command-line interface when running tests.  ... 
doi:10.1016/j.jss.2012.09.026 fatcat:llmuq2bhjvezjowfhwzqqwnici

Comparative Studies of Programming Languages; Course Lecture Notes [article]

Joey Paquet, Serguei A. Mokhov
2010 arXiv   pre-print
Lecture notes for the Comparative Studies of Programming Languages course, COMP6411, taught at the Department of Computer Science and Software Engineering, Faculty of Engineering and Computer Science,  ...  However, the emphasis of the reflection-oriented paradigm is dynamic program modification, which can be determined and executed at runtime.  ...  That is, the program architecture itself can be decided at runtime based upon the data, services, and specific operations that are applicable at runtime.  ... 
arXiv:1007.2123v6 fatcat:4vwgbvr4xbhzjoubgv7d52mrke

A lightweight interactive debugger for haskell

Simon Marlow, José Iborra, Bernard Pope, Andy Gill
2007 Proceedings of the ACM SIGPLAN workshop on Haskell workshop - Haskell '07  
The debugger has a novel approach for reconstructing the type of runtime values in a polymorphic context.  ...  The design focusses on availability: our debugger is intended to work on all programs that can be compiled with GHC, and without requiring the programmer to jump through additional hoops to debug their  ...  Stopping at a breakpoint is handled using the existing blocking/resuming capabilities provided by MVars, so the runtime scheduler needs no modifications.  ... 
doi:10.1145/1291201.1291204 dblp:conf/haskell/MarlowIPG07 fatcat:ujvzfkzusvf75ehuwxzond3m6u

A dynamically reconfigurable architecture for smart grids

David Villa, Cleto Martin, Felix Villanueva, Francisco Moya, Juan Lopez
2011 IEEE transactions on consumer electronics  
We built an actual implementation of a low-cost embeddable control/meter device that may even be attached to individual appliances.  ...  In this situation, the grid may be reconfigured to isolate the faulty zone by using an architecture that provides dynamic control. • Dynamic load balancing: usually, different parts of the grid are not  ...  A switch would act over one or tens of power lines with a simple runtime reconfiguration.  ... 
doi:10.1109/tce.2011.5955174 fatcat:xd4hy7knybhhjcrv7yazynlfcq

The history of Standard ML

David MacQueen, Robert Harper, John Reppy
2020 Proceedings of the ACM on Programming Languages (PACMPL)  
Like Lisp, POP-2 was a functional language with dynamic binding and dynamic (i.e., runtime) typing, but its syntax was in the ALGOL-style, and its features were heavily influenced by the work of Strachey  ...  Lisp was a functional language that could manipulate functions as data, although its behavior as a functional language was flawed by the use of dynamic binding.  ...  The combination of these techniques allows the compiler to get precise information about control flow and runtime representations.  ... 
doi:10.1145/3386336 fatcat:2hrtsaf5azfe3htngsqvxv3kre

Description and Optimization of Abstract Machines in a Dialect of Prolog

JOSÉ F. MORALES, MANUEL CARRO, MANUEL HERMENEGILDO
2015 Theory and Practice of Logic Programming  
and at the implementation levels.  ...  AbstractIn order to achieve competitive performance, abstract machines for Prolog and related languages end up being large and intricate, and incorporate sophisticated optimizations, both at the design  ...  through projects TIN2012-39391 StrongSoft and TIN2008-05624 DOVES, and by the Madrid Regional Government through project S-0505/TIC/0407 PROMESAS.  ... 
doi:10.1017/s1471068414000672 fatcat:os744fi5x5dbza5kpjv2v43zym

Applications and Techniques for Fast Machine Learning in Science [article]

Allison McCarn Deiana, Joshua Agar, Michaela Blott, Giuseppe Di Guglielmo, Javier Duarte, Philip Harris, Scott Hauck, Mia Liu, Mark S. Neubauer, Jennifer Ngadiuba, Seda Ogrenci-Memik, Maurizio Pierini (+74 others)
2021 arXiv   pre-print
This community report is intended to give plenty of examples and inspiration for scientific discovery through integrated and accelerated ML solutions.  ...  In this community review report, we discuss applications and techniques for fast machine learning (ML) in science -- the concept of integrating power ML methods into the real-time experimental data processing  ...  Access is at maximum speed through high-end hardened memory controllers, offering 282 Gbps bandwidth (for example Cascade Lake with 12 DDR4 channels).  ... 
arXiv:2110.13041v1 fatcat:cvbo2hmfgfcuxi7abezypw2qrm

Design, scale-up and characterization of the data acquisition system for the ANAIS dark matter experiment [article]

M. A. Oliván
2016 arXiv   pre-print
This experiment could confirm the DAMA/LIBRA positive signal with the same target and technique.  ...  , a background as low as possible in the region of interest, a high enough exposure and a rigorous parameter control in order to monitor systematics.  ...  The use of the asynchronous data storing isolates the data acquisition from the unwanted latencies of the filesystem writing.  ... 
arXiv:1601.07312v1 fatcat:uhszjbqg4nhbjbpd7cvmzfzsrm

Satellite Communications in the New Space Era: A Survey and Future Challenges

Oltjon Kodheli, Eva Lagunas, Nicola Maturo, Shree Krishna Sharma, Bhavani Shankar, Jesus Fabian Mendoza Montoya, Juan Carlos Merlano Duncan, Danilo Spano, Symeon Chatzinotas, Steven Kisseleff, Jorge Querol, Lei Lei (+2 others)
2020 IEEE Communications Surveys and Tutorials  
The present survey aims at capturing the state of the art in SatComs, while highlighting the most promising open research topics.  ...  Satellite communications (SatComs) have recently entered a period of renewed interest motivated by technological advances and nurtured through private investment and ventures.  ...  plane resources (e.g., data forwarding functions) from control and management functions; (2) centralization of the management-control functions and; (3) programmabillity of network functionality through  ... 
doi:10.1109/comst.2020.3028247 fatcat:qdsitas5xjhwtfhs6nin3eus5q

Satellite Communications in the New Space Era: A Survey and Future Challenges [article]

O. Kodheli, E. Lagunas, N. Maturo, S. K. Sharma, B. Shankar, J. F. Mendoza Montoya, J. C. Merlano Duncan, D. Spano, S. Chatzinotas, S. Kisseleff, J. Querol, L. Lei (+2 others)
2020 arXiv   pre-print
The present survey aims at capturing the state of the art in SatComs, while highlighting the most promising open research topics.  ...  Satellite communications have recently entered a period of renewed interest motivated by technological advances and nurtured through private investment and ventures.  ...  A promising architecture and implementation comes from SDN where networks can be dynamically programmed through centralized control points and from NFV enabling the cost-efficient deployment and runtime  ... 
arXiv:2002.08811v2 fatcat:u3uvhm5bovg6povxbwwl5h6rqq

Fungi: Typed incremental computation with names [article]

Matthew A. Hammer, Jana Dunfield, Kyle Headley, Monal Narasimhamurthy, Dimitrios J. Economou
2018 arXiv   pre-print
To maximize this reuse in a general-purpose programming setting, programmers need a mechanism to identify dynamic allocations (of data and subcomputations) that correspond over time.  ...  Next, control returns to t·n 1 ·0, which overwrites its output cell's tail pointer with the inserted (and new) cell at r·n 3 .  ...  The type for Nil allows any name set (a safe overapproximation), since Nil contains no concrete names at runtime. Similarly, the type for an empty trie (not shown) allows any name set.  ... 
arXiv:1808.07826v1 fatcat:lmfptefrzrgxtah4clx2v4w3lm

Compositionally adaptive mobile software agents for pervasive environments

Kutila Perera Rajakaruna Gunasekera
2017
The inherent nature of pervasive environments is that they are complex, heterogeneous and highly dynamic.  ...  This thesis investigates, proposes and develops a novel platform for building adaptive software agents which combines mobility with the ability to dynamically change the internal structure and capabilities  ...  If the composition occurs at application runtime, it is termed dynamic composition.  ... 
doi:10.4225/03/58901662e2f52 fatcat:b7zh75ejhjgihlwbyhi5epqa6e

IAFS 2017 Abstracts

2017 Forensic Science International  
There are different types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and smaller control systems which are implemented using  ...  Following data collection, a binary logistic regression model was used to analyse possible correlation between arcus cornea, xanthelasma, earlobe creases and cardiovascular disease.  ...  LC runtime was 2.5 minutes. Results: Two sets of urine samples were tested with two different target lists (~ 100 compounds each with some variations).  ... 
doi:10.1016/j.forsciint.2017.07.019 pmid:28743352 fatcat:pdrympkytzbzlkah4vnqismhau

Initialisation Problems in Feature Composition

Armstrong Nhlabatsi
2009
At the core of our approach is an explicit consideration of all possible states of a resource as potential initial states.  ...  Composing features that have inconsistent requirements may lead to feature interactions that violate requirements satisfied by each feature in isolation.  ...  For this benefit I owe gratitude to a number of people who have helped me through this experience.  ... 
doi:10.21954/ou.ro.0000eb4f fatcat:a66jls7a6bforphjqbseixja4u
« Previous Showing results 1 — 15 out of 27 results