22,190 research outputs found
Device-Centric Monitoring for Mobile Device Management
The ubiquity of computing devices has led to an increased need to ensure not
only that the applications deployed on them are correct with respect to their
specifications, but also that the devices are used in an appropriate manner,
especially in situations where the device is provided by a party other than the
actual user. Much work which has been done on runtime verification for mobile
devices and operating systems is mostly application-centric, resulting in
global, device-centric properties (e.g. the user may not send more than 100
messages per day across all applications) being difficult or impossible to
verify. In this paper we present a device-centric approach to runtime verify
the device behaviour against a device policy with the different applications
acting as independent components contributing to the overall behaviour of the
device. We also present an implementation for Android devices, and evaluate it
on a number of device-centric policies, reporting the empirical results
obtained.Comment: In Proceedings FESCA 2016, arXiv:1603.0837
Extensible Technology-Agnostic Runtime Verification
With numerous specialised technologies available to industry, it has become
increasingly frequent for computer systems to be composed of heterogeneous
components built over, and using, different technologies and languages. While
this enables developers to use the appropriate technologies for specific
contexts, it becomes more challenging to ensure the correctness of the overall
system. In this paper we propose a framework to enable extensible technology
agnostic runtime verification and we present an extension of polyLarva, a
runtime-verification tool able to handle the monitoring of
heterogeneous-component systems. The approach is then applied to a case study
of a component-based artefact using different technologies, namely C and Java.Comment: In Proceedings FESCA 2013, arXiv:1302.478
Carlhintzeite, Ca2AlF7•H2O, from the Gigante granitic pegmatite, Córdoba province, Argentina: Description and crystal structure
Carlhintzeite, Ca2AlF7•H2O, has been found at the Gigante pegmatite, Punilla Department, Córdoba Province, Argentina. It occurs as colourless prismatic crystals up to 0.8 mm long, ubiquitously twinned on {001}. Electron microprobe analyses provided the empirical formula Ca1.98Al1.02F6.24(OH) 0.76•H1.62O. A crystal fragment used for the collection of structure data provided the triclinic, C1 cell: a = 9.4227(4), b = 6.9670(5), c = 9.2671(7) Å, α = 90.974(6), β = 104.802(5), γ = 90.026(6)°, V = 558.08(7) Å3 and Z = 4. The crystal structure, solved by direct methods and refined to R 1 = 0.0322 for 723 Fo > 4σF reflections, is made up of linkages of AlF6 octahedra, CaF8 polyhedra and CaF 6(H2O)2 polyhedra. The AlF6 octahedra are isolated from one another, but share polyhedral elements with Ca polyhedra. Most notably, the Al1 octahedron shares trans faces with two CaF 8 polyhedra and the Al2 octahedron shares trans edges with two CaF6(H2O)2 polyhedra. The linkage of the Ca polyhedra alone can be described as a framework in which edge-sharing chains along b are cross-linked by edge-sharing. Edge-sharing chains of Ca polyhedra along b in the carlhintzeite structure are similar to those along c in the structures of gearksutite, CaAlF4(OH)•(H2O), and prosopite, CaAl2F4(OH)4. © 2010 Mineralogical Society.Fil: Kampf, A. R.. Natural History Museum of Los Angeles County; Estados UnidosFil: Colombo, Fernando. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Centro de Investigaciones en Ciencias de la Tierra. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Centro de Investigaciones en Ciencias de la Tierra; ArgentinaFil: González Del Tánago, J.. Universidad Complutense de Madrid; Españ
Ground state and excitation dynamics in Ag doped helium clusters
We present a quantum Monte Carlo study of the structure and energetics of
silver doped helium clusters AgHe for up to 100. Our simulations show
the first solvation shell of the Ag atom to be composed by roughly 20 He atoms,
and to possess a structured angular distribution. Moreover, the electronic
PS and PS
electronic transitions of the embedded silver impurity have been studied as a
function of the number ofhelium atoms. The computed spectra show a redshift for
and an increasing blueshift for larger clusters, a feature
attributed to the effect of the second solvation shell of He atoms. For the
largest cluster, the computed excitation spectrum is found in excellent
agreement with the ones recorded in superfluid He clusters and bulk. No
signature of the direct formation of proposed AgHe exciplex is present in
the computed spectra of AgHe.Comment: 4 Pages, 3 Figures, submitted to Phys. Rev. Let
Bifurcations of piecewise smooth flows:perspectives, methodologies and open problems
In this paper, the theory of bifurcations in piecewise smooth flows is critically surveyed. The focus is on results that hold in arbitrarily (but finitely) many dimensions, highlighting significant areas where a detailed understanding is presently lacking. The clearest results to date concern equilibria undergoing bifurcations at switching boundaries, and limit cycles undergoing grazing and sliding bifurcations. After discussing fundamental concepts, such as topological equivalence of two piecewise smooth systems, discontinuity-induced bifurcations are defined for equilibria and limit cycles. Conditions for equilibria to exist in n-dimensions are given, followed by the conditions under which they generically undergo codimension-one bifurcations. The extent of knowledge of their unfoldings is also summarized. Codimension-one bifurcations of limit cycles and boundary-intersection crossing are described together with techniques for their classification. Codimension-two bifurcations are discussed with suggestions for further study
Simplifying Contract-Violating Traces
Contract conformance is hard to determine statically, prior to the deployment
of large pieces of software. A scalable alternative is to monitor for contract
violations post-deployment: once a violation is detected, the trace
characterising the offending execution is analysed to pinpoint the source of
the offence. A major drawback with this technique is that, often, contract
violations take time to surface, resulting in long traces that are hard to
analyse. This paper proposes a methodology together with an accompanying tool
for simplifying traces and assisting contract-violation debugging.Comment: In Proceedings FLACOS 2012, arXiv:1209.169
Comprehensive Monitor-Oriented Compensation Programming
Compensation programming is typically used in the programming of web service
compositions whose correct implementation is crucial due to their handling of
security-critical activities such as financial transactions. While traditional
exception handling depends on the state of the system at the moment of failure,
compensation programming is significantly more challenging and dynamic because
it is dependent on the runtime execution flow - with the history of behaviour
of the system at the moment of failure affecting how to apply compensation. To
address this dynamic element, we propose the use of runtime monitors to
facilitate compensation programming, with monitors enabling the modeller to be
able to implicitly reason in terms of the runtime control flow, thus separating
the concerns of system building and compensation modelling. Our approach is
instantiated into an architecture and shown to be applicable to a case study.Comment: In Proceedings FESCA 2014, arXiv:1404.043
- …
