Filters








68,771 Hits in 5.8 sec

On the Monitorability of Session Types, in Theory and Practice [article]

Christian Batrolo Burlò, Adrian Francalanza, Alceste Scalas
2021 arXiv   pre-print
This work takes a fresh look at the run-time verification of communicating systems using session types, in theory and in practice.  ...  On the theoretical side, we develop a novel formal model of session-monitored processes; with it, we formulate and prove new results on the monitorability of session types, connecting their run-time and  ...  Our plan is to study more instances of C, T and M -both in theory, and in practice.  ... 
arXiv:2105.06291v1 fatcat:wpy4l4tf3rhqhhqgyzbohtrcbu

Mixing Metaphors: Actors as Channels and Channels as Actors (Extended Version) [article]

Simon Fowler and Sam Lindley and Philip Wadler
2017 arXiv   pre-print
Channel- and actor-based programming languages are both used in practice, but the two are often confused.  ...  The lack of a common representation makes it difficult to reason about translations that exist in the folklore.  ...  Acknowledgements This work was supported by EPSRC grants EP/L01503X/1 (University of Edinburgh CDT in Pervasive Parallelism) and EP/K034413/1 (A Basis for Concurrency and Distribution).  ... 
arXiv:1611.06276v3 fatcat:cwxxevrf6naw7ox64mqqway4xi

From IP ID to Device ID and KASLR Bypass (Extended Version) [article]

Amit Klein, Benny Pinkas
2019 arXiv   pre-print
Our work examines the generation of this field in Windows (versions 8 and higher), Linux and Android, and shows that the IP ID field enables remote servers to assign a unique ID to each device and thus  ...  Our work includes reverse-engineering of the Windows IP ID generation code, and a cryptanalysis of this code and of the Linux kernel IP ID generation code.  ...  technique (by extending the key to 64 bits) in a patch 6 applied to Linux kernel versions 5.1-rc4, 5.0.8, 4.19.35, 4.14.112, 4.9.169 and 4.4.179.  ... 
arXiv:1906.10478v2 fatcat:aqxxj4w54bhstbonrts23gy4qq

Specifying and Verifying Properties of Space - Extended Version [article]

Vincenzo Ciancia, Diego Latella, Michele Loreti, Mieke Massink
2014 arXiv   pre-print
We further extend the framework with a spatial until operator, and define an efficient model checking procedure, implemented in a proof-of-concept tool.  ...  The interplay between process behaviour and spatial aspects of computation has become more and more relevant in Computer Science, especially in the field of collective adaptive systems, but also, more  ...  As a mere hint on how practical it is to use a model checker for image analysis, the execution time on our test image, consisting of about 250000 pixels, is in the order of ten seconds on a standard laptop  ... 
arXiv:1406.6393v2 fatcat:6hzrcbcvzzf7hisq6jhwurambu

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud (Extended Version) [article]

William C. Garrison III and Adam Shull and Steven Myers and Adam J. Lee
2016 arXiv   pre-print
In this paper, we show that the cryptographic enforcement of dynamic access controls on untrusted platforms incurs computational costs that are likely prohibitive in practice.  ...  This is contrary to the needs of most practical applications, which leverage dynamic data and/or policies.  ...  This work was supported, in part, by the National Science Foundation under awards CNS-1111149, CNS-1228697, and CNS-1253204.  ... 
arXiv:1602.09069v3 fatcat:7qj52z3l3bdhvdducoskpj7xmq

Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version] [article]

M. Camilla Fiazza, Michele Peroli, Luca Viganò
2011 arXiv   pre-print
In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers.  ...  We then present a new strategy to defend security protocols, based on active exploitation of attack interference.  ...  (www.avantssar.eu) and by the FP7-ICT-2009-5 Project no. 257876, "SPaCIoS: Secure Provision and Consumption in the Internet of Services" (www.spacios.eu).  ... 
arXiv:1106.3746v1 fatcat:mvafqt5ie5h4lj5aa6sbrtpp5i

Towards the Systematic Testing of Virtual Reality Programs (extended version) [article]

Stevao A. Andrade, Fatima L. S. Nunes, Marcio E. Delamaro
2020 arXiv   pre-print
We compared the current state of software testing practice in open-source VR projects and evaluate how the lack of testing can be damaging to the development of a product.  ...  The results showed that the practice of software testing is not yet widespread in the development of VR applications. It was also found that there is a high incidence of code smells in VR projects.  ...  Acknowledgements We also would like to thanks Tushar Sharma and Designite team by providing us an Academic license of Designite tool.  ... 
arXiv:2009.08930v1 fatcat:hxzt37z7qzhcjflc3szp6kl5hu

Effects of an Extended Version of the Lee Silverman Voice Treatment on Voice and Speech in Parkinson's Disease

Jennifer Spielman, Lorraine O. Ramig, Leslie Mahler, Angela Halpern, William J. Gavin
2007 American Journal of Speech-Language Pathology  
Purpose: The present study examined vocal SPL, voice handicap, and speech characteristics in Parkinson's disease (PD) following an extended version of the Lee Silverman Voice Treatment (LSVT), to help  ...  Method: Twelve participants with idiopathic PD received the extended treatment version (LSVT-X), similar to LSVT except that it was administered twice a week in 1-hr sessions over 8 weeks and required  ...  Finally, special thanks to the participants and families who participated in this study.  ... 
doi:10.1044/1058-0360(2007/014) pmid:17456888 fatcat:s3cfccskf5gxnfgro6bf7sf4hi

The Scribble Protocol Language [chapter]

Nobuko Yoshida, Raymond Hu, Rumyana Neykova, Nicholas Ng
2014 Lecture Notes in Computer Science  
This paper describes a brief history of how Kohei Honda initiated the Scribble project, and summarises the current status of Scribble.  ...  The work has been partially sponsored by the Ocean Observatories Initiative, VMware, EP-SRC KTS under Cognizant, and EPSRC EP/K011715/1, EP/K034413/1 and EP/G015635/1.  ...  A protocol is a minimal structure which guarantees type-safety of conversations, and has been known as session type [7, 13, 19, 24, 41] in theories of processes which in turn is based on theories of  ... 
doi:10.1007/978-3-319-14128-2_3 fatcat:r2nsvqeegjaplizemlnees3eue

The Scribble Protocol Language [chapter]

Nobuko Yoshida, Raymond Hu, Rumyana Neykova, Nicholas Ng
2014 Lecture Notes in Computer Science  
This paper describes a brief history of how Kohei Honda initiated the Scribble project, and summarises the current status of Scribble.  ...  The work has been partially sponsored by the Ocean Observatories Initiative, VMware, EP-SRC KTS under Cognizant, and EPSRC EP/K011715/1, EP/K034413/1 and EP/G015635/1.  ...  A protocol is a minimal structure which guarantees type-safety of conversations, and has been known as session type [7, 13, 19, 24, 41] in theories of processes which in turn is based on theories of  ... 
doi:10.1007/978-3-319-05119-2_3 fatcat:6czxti2ptzeoxpmtw6dzp7xspe

Towards a Hybrid Verification Methodology for Communication Protocols (Short Paper) [chapter]

Christian Bartolo Burlò, Adrian Francalanza, Alceste Scalas
2020 Lecture Notes in Computer Science  
We outline our theory, and illustrate a tool that automatically synthesises type-checked session monitors, based on the Scala language and its session programming library (lchannels).  ...  We automate a solution for binary sessions where one endpoint is statically checked, and the other endpoint is dynamically checked by a monitor acting as an intermediary between typed and untyped components  ...  The work in [6] formalises a theory of monitored (multiparty) session types, based on a global, centralised router providing a safe transport network that dispatches messages between participant processes  ... 
doi:10.1007/978-3-030-50086-3_13 fatcat:xfaow2m4hvcpfelwoyevzaplsm

Call for Papers Power Engineering Society Winter Meeting

1987 IEEE Power Engineering Review  
the current requirements, and a supply of model paper on which the manuscript is to be typed.  ...  Monitoring and Control of Rotating Ma¬ chines, with Emphasis on Use of Advanced and Microprocessor Instrumentation and on Defining Monitoring Parameters and Sensi¬ tivity Levels .  ... 
doi:10.1109/mper.1987.5527108 fatcat:ywjbkuigyzcpban63j6rizxhhm

Practical interruptible conversations: distributed dynamic verification with multiparty session types and Python

Romain Demangeon, Kohei Honda, Raymond Hu, Rumyana Neykova, Nobuko Yoshida
2014 Formal methods in system design  
Finally, we expose the underlying theory of our interrupt mechanism, studying its syntax and semantics, its integration in MPST theory and proving the correctness of our design.  ...  Drawn from our industrial collaborations [40, 34] on Scribble, a choreography description language based on multiparty session types, and its theoretical foundations [20] , this article proposes a dynamic  ...  Acknowledgements We thank Gary Brown, Matthew Arrot and the Scribble team for discussions and collaborations.  ... 
doi:10.1007/s10703-014-0218-8 fatcat:j2ns5fnyzje53nt7ybhi7cz65a

Practical Interruptible Conversations [chapter]

Raymond Hu, Rumyana Neykova, Nobuko Yoshida, Romain Demangeon, Kohei Honda
2013 Lecture Notes in Computer Science  
Finally, we expose the underlying theory of our interrupt mechanism, studying its syntax and semantics, its integration in MPST theory and proving the correctness of our design.  ...  Drawn from our industrial collaborations [40, 34] on Scribble, a choreography description language based on multiparty session types, and its theoretical foundations [20] , this article proposes a dynamic  ...  Acknowledgements We thank Gary Brown, Matthew Arrot and the Scribble team for discussions and collaborations.  ... 
doi:10.1007/978-3-642-40787-1_8 fatcat:xah5ce63t5cxlpvnyd2fl4efo4

SPY: Local Verification of Global Protocols [chapter]

Rumyana Neykova, Nobuko Yoshida, Raymond Hu
2013 Lecture Notes in Computer Science  
Building on the theory of multiparty session types, our toolchain implementation validates communication safety properties on the global protocol, but enforces them via independent monitoring of each endpoint  ...  Each monitor can be internally embedded in or externally deployed alongside the endpoint runtime, and detects the occurrence of illegal communication actions and message types that do not conform to the  ...  The goal of Scribble is to provide an intuitive engineering language and tools, based on the theory of multiparty session types (MPST) [7] , for specifying and reasoning about message passing protocols  ... 
doi:10.1007/978-3-642-40787-1_25 fatcat:ku2oqd2plfe3vliv64bpoewhti
« Previous Showing results 1 — 15 out of 68,771 results