1,937 research outputs found

    Exponential dichotomies of evolution operators in Banach spaces

    Full text link
    This paper considers three dichotomy concepts (exponential dichotomy, uniform exponential dichotomy and strong exponential dichotomy) in the general context of non-invertible evolution operators in Banach spaces. Connections between these concepts are illustrated. Using the notion of Green function, we give necessary conditions and sufficient ones for strong exponential dichotomy. Some illustrative examples are presented to prove that the converse of some implication type theorems are not valid

    Sustainable solutions for the construction sector: integration of secondary raw materials in the production cycle of concrete

    Get PDF
    The construction industry is one of the largest consumers of raw materials and energy and one of the highest contributor to green-houses gases emissions. In order to become more sustainable it needs to reduce the use of both raw materials and energy, thus lim-iting its environmental impact. Developing novel technologies to integrate secondary raw materials (i.e. lightweight recycled aggre-gates and alkali activated “cementless” binders - geopolymers) in the production cycle of concrete is an all-inclusive solution to im-prove both sustainability and cost-efficiency of construction industry. SUS-CON “SUStainable, Innovative and Energy-Efficiency CONcrete, based on the integration of all-waste materials” is an European project (duration 2012-2015), which aim was the inte-gration of secondary raw materials in the production cycle of concrete, thus resulting in innovative, sustainable and cost-effective building solutions. This paper presents the main outcomes related to the successful scaling-up of SUS-CON concrete solutions in traditional production plants. Two European industrial concrete producers have been involved, to design and produce both pre-cast components (blocks and panels) and ready-mixed concrete. Recycled polyurethane foams and mixed plastics were used as aggre-gates, PFA (Pulverized Fuel Ash, a by-product of coal fuelled power plants) and GGBS (Ground Granulated Blast furnace Slag, a by-product of iron and steel industries) as binders. Eventually, the installation of SUS-CON concrete solutions on real buildings has been demonstrated, with the construction of three mock-ups located in Europe (Spain, Turkey and Romania

    Effect of maleic anhydride–aniline derivative buffer layer on the properties of flexible substrate heterostructures: Indium tin oxide/nucleic acid base/metal

    Get PDF
    This paper presents some investigations on the properties of guanine (G) and cytosine (C) based heterostructures deposited on flexible substrates. The effects of two types of maleic anhydride–aniline derivatives (maleic anhydride-cyano aniline or maleic anhydride-2,4 dinitroaniline) buffer layer, deposited between indium tin oxide and (G) or (C) layer, on the optical and electrical properties of the heterostructures have been identified.The heterostructures containing a film of maleic anhydride-2,4 dinitroaniline have shown a good transparency and low photoluminescence in visible range. This buffer layer has determined an increase in the conductance only in the heterostructures based on (G) and (C) deposited on biaxially-oriented polyethylene terephthalate substrate

    Using Verification Technology to Specify and Detect Malware

    Get PDF
    Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checking based approach to malware detection can capture the semantics of security exploits more accurately than traditional approaches, and consequently achieve higher detection rates. In this approach, malicious behavior is formalized using the expressive specification language CTPL based on classic CTL. This paper gives an overview of our toolchain for malware detection and presents our new system for computer assisted generation of malicious code specifications

    Choreographies in Practice

    Full text link
    Choreographic Programming is a development methodology for concurrent software that guarantees correctness by construction. The key to this paradigm is to disallow mismatched I/O operations in programs, called choreographies, and then mechanically synthesise distributed implementations in terms of standard process models via a mechanism known as EndPoint Projection (EPP). Despite the promise of choreographic programming, there is still a lack of practical evaluations that illustrate the applicability of choreographies to concrete computational problems with standard concurrent solutions. In this work, we explore the potential of choreographies by using Procedural Choreographies (PC), a model that we recently proposed, to write distributed algorithms for sorting (Quicksort), solving linear equations (Gaussian elimination), and computing Fast Fourier Transform. We discuss the lessons learned from this experiment, giving possible directions for the usage and future improvements of choreography languages

    The Paths to Choreography Extraction

    Get PDF
    Choreographies are global descriptions of interactions among concurrent components, most notably used in the settings of verification (e.g., Multiparty Session Types) and synthesis of correct-by-construction software (Choreographic Programming). They require a top-down approach: programmers first write choreographies, and then use them to verify or synthesize their programs. However, most existing software does not come with choreographies yet, which prevents their application. To attack this problem, we propose a novel methodology (called choreography extraction) that, given a set of programs or protocol specifications, automatically constructs a choreography that describes their behavior. The key to our extraction is identifying a set of paths in a graph that represents the symbolic execution of the programs of interest. Our method improves on previous work in several directions: we can now deal with programs that are equipped with a state and internal computation capabilities; time complexity is dramatically better; we capture programs that are correct but not necessarily synchronizable, i.e., they work because they exploit asynchronous communication
    corecore