22,190 research outputs found

    Device-Centric Monitoring for Mobile Device Management

    Full text link
    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications) being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.Comment: In Proceedings FESCA 2016, arXiv:1603.0837

    Extensible Technology-Agnostic Runtime Verification

    Full text link
    With numerous specialised technologies available to industry, it has become increasingly frequent for computer systems to be composed of heterogeneous components built over, and using, different technologies and languages. While this enables developers to use the appropriate technologies for specific contexts, it becomes more challenging to ensure the correctness of the overall system. In this paper we propose a framework to enable extensible technology agnostic runtime verification and we present an extension of polyLarva, a runtime-verification tool able to handle the monitoring of heterogeneous-component systems. The approach is then applied to a case study of a component-based artefact using different technologies, namely C and Java.Comment: In Proceedings FESCA 2013, arXiv:1302.478

    Carlhintzeite, Ca2AlF7•H2O, from the Gigante granitic pegmatite, Córdoba province, Argentina: Description and crystal structure

    Get PDF
    Carlhintzeite, Ca2AlF7•H2O, has been found at the Gigante pegmatite, Punilla Department, Córdoba Province, Argentina. It occurs as colourless prismatic crystals up to 0.8 mm long, ubiquitously twinned on {001}. Electron microprobe analyses provided the empirical formula Ca1.98Al1.02F6.24(OH) 0.76•H1.62O. A crystal fragment used for the collection of structure data provided the triclinic, C1 cell: a = 9.4227(4), b = 6.9670(5), c = 9.2671(7) Å, α = 90.974(6), β = 104.802(5), γ = 90.026(6)°, V = 558.08(7) Å3 and Z = 4. The crystal structure, solved by direct methods and refined to R 1 = 0.0322 for 723 Fo > 4σF reflections, is made up of linkages of AlF6 octahedra, CaF8 polyhedra and CaF 6(H2O)2 polyhedra. The AlF6 octahedra are isolated from one another, but share polyhedral elements with Ca polyhedra. Most notably, the Al1 octahedron shares trans faces with two CaF 8 polyhedra and the Al2 octahedron shares trans edges with two CaF6(H2O)2 polyhedra. The linkage of the Ca polyhedra alone can be described as a framework in which edge-sharing chains along b are cross-linked by edge-sharing. Edge-sharing chains of Ca polyhedra along b in the carlhintzeite structure are similar to those along c in the structures of gearksutite, CaAlF4(OH)•(H2O), and prosopite, CaAl2F4(OH)4. © 2010 Mineralogical Society.Fil: Kampf, A. R.. Natural History Museum of Los Angeles County; Estados UnidosFil: Colombo, Fernando. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Centro de Investigaciones en Ciencias de la Tierra. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Centro de Investigaciones en Ciencias de la Tierra; ArgentinaFil: González Del Tánago, J.. Universidad Complutense de Madrid; Españ

    Ground state and excitation dynamics in Ag doped helium clusters

    Get PDF
    We present a quantum Monte Carlo study of the structure and energetics of silver doped helium clusters AgHen_n for nn up to 100. Our simulations show the first solvation shell of the Ag atom to be composed by roughly 20 He atoms, and to possess a structured angular distribution. Moreover, the electronic 2^2P1/22_{1/2}\leftarrow ^2S1/2_{1/2} and 2^2P3/22_{3/2}\leftarrow ^2S1/2_{1/2} electronic transitions of the embedded silver impurity have been studied as a function of the number ofhelium atoms. The computed spectra show a redshift for n15n\leq 15 and an increasing blueshift for larger clusters, a feature attributed to the effect of the second solvation shell of He atoms. For the largest cluster, the computed excitation spectrum is found in excellent agreement with the ones recorded in superfluid He clusters and bulk. No signature of the direct formation of proposed AgHe2_2 exciplex is present in the computed spectra of AgHe100_{100}.Comment: 4 Pages, 3 Figures, submitted to Phys. Rev. Let

    Bifurcations of piecewise smooth flows:perspectives, methodologies and open problems

    Get PDF
    In this paper, the theory of bifurcations in piecewise smooth flows is critically surveyed. The focus is on results that hold in arbitrarily (but finitely) many dimensions, highlighting significant areas where a detailed understanding is presently lacking. The clearest results to date concern equilibria undergoing bifurcations at switching boundaries, and limit cycles undergoing grazing and sliding bifurcations. After discussing fundamental concepts, such as topological equivalence of two piecewise smooth systems, discontinuity-induced bifurcations are defined for equilibria and limit cycles. Conditions for equilibria to exist in n-dimensions are given, followed by the conditions under which they generically undergo codimension-one bifurcations. The extent of knowledge of their unfoldings is also summarized. Codimension-one bifurcations of limit cycles and boundary-intersection crossing are described together with techniques for their classification. Codimension-two bifurcations are discussed with suggestions for further study

    Simplifying Contract-Violating Traces

    Full text link
    Contract conformance is hard to determine statically, prior to the deployment of large pieces of software. A scalable alternative is to monitor for contract violations post-deployment: once a violation is detected, the trace characterising the offending execution is analysed to pinpoint the source of the offence. A major drawback with this technique is that, often, contract violations take time to surface, resulting in long traces that are hard to analyse. This paper proposes a methodology together with an accompanying tool for simplifying traces and assisting contract-violation debugging.Comment: In Proceedings FLACOS 2012, arXiv:1209.169

    Comprehensive Monitor-Oriented Compensation Programming

    Full text link
    Compensation programming is typically used in the programming of web service compositions whose correct implementation is crucial due to their handling of security-critical activities such as financial transactions. While traditional exception handling depends on the state of the system at the moment of failure, compensation programming is significantly more challenging and dynamic because it is dependent on the runtime execution flow - with the history of behaviour of the system at the moment of failure affecting how to apply compensation. To address this dynamic element, we propose the use of runtime monitors to facilitate compensation programming, with monitors enabling the modeller to be able to implicitly reason in terms of the runtime control flow, thus separating the concerns of system building and compensation modelling. Our approach is instantiated into an architecture and shown to be applicable to a case study.Comment: In Proceedings FESCA 2014, arXiv:1404.043
    corecore