scholarly journals On type-cases, union elimination, and occurrence typing

2022 ◽  
Vol 6 (POPL) ◽  
pp. 1-31
Author(s):  
Giuseppe Castagna ◽  
Mickaël Laurent ◽  
Kim Nguyễn ◽  
Matthew Lutze

We extend classic union and intersection type systems with a type-case construction and show that the combination of the union elimination rule of the former and the typing rules for type-cases of our extension encompasses occurrence typing . To apply this system in practice, we define a canonical form for the expressions of our extension, called MSC-form. We show that an expression of the extension is typable if and only if its MSC-form is, and reduce the problem of typing the latter to the one of reconstructing annotations for that term. We provide a sound algorithm that performs this reconstruction and a proof-of-concept implementation.

Author(s):  
Giovanni Camurati ◽  
Aurélien Francillon ◽  
François-Xavier Standaert

Recently, some wireless devices have been found vulnerable to a novel class of side-channel attacks, called Screaming Channels. These leaks might appear if the sensitive leaks from the processor are unintentionally broadcast by a radio transmitter placed on the same chip. Previous work focuses on identifying the root causes, and on mounting an attack at a distance considerably larger than the one achievable with conventional electromagnetic side channels, which was demonstrated in the low-noise environment of an anechoic chamber. However, a detailed understanding of the leak, attacks that take full advantage of the novel vector, and security evaluations in more practical scenarios are still missing. In this paper, we conduct a thorough experimental analysis of the peculiar properties of Screaming Channels. For example, we learn about the coexistence of intended and unintended data, the role of distance and other parameters on the strength of the leak, the distortion of the leakmodel, and the portability of the profiles. With such insights, we build better attacks. We profile a device connected via cable with 10000·500 traces. Then, 5 months later, we attack a different instance at 15m in an office environment. We recover the AES-128 key with 5000·1000 traces and key enumeration up to 223. Leveraging spatial diversity, we mount some attacks in the presence of obstacles. As a first example of application to a real system, we show a proof-of-concept attack against the authentication method of Google Eddystone beacons. On the one side, this work lowers the bar for more realistic attacks, highlighting the importance of the novel attack vector. On the other side, it provides a broader security evaluation of the leaks, helping the defender and radio designers to evaluate risk, and the need of countermeasures.


Author(s):  
Andrzej Grzebielec ◽  
Adam Szelągowski ◽  
Adam Ruciński

Adsorption refrigeration systems, as opposed to absorption type operate in a cyclic manner. The result is that at the beginning of each process must be fed into the adsorber state in which they will adsorb or desorb a refrigerant. In the case of two adsorbers at the start of a cycle, the one of the adsorber must be refrigerated while the second has to be heated. These processes are causing unnecessary energy loss. The aim of the work is to show how these processes can be connected and the heat received from one adsorber is transported to another adsorber. As part of the study, the heat and mass recovery processes will be considered. It turns out that in the thermal wave type systems, it is possible to recover more than 25% of the energy lost to bring the adsorber to the states in which they will operate efficiently to desorb and adsorb refrigerant. That is, it is possible to improve the efficiency of the adsorption refrigeration unit using the proposed improvements.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Charlotte Martial ◽  
Armand Mensen ◽  
Vanessa Charland-Verville ◽  
Audrey Vanhaudenhuyse ◽  
Daniel Rentmeister ◽  
...  

Abstract The neurobiological basis of near-death experiences (NDEs) is unknown, but a few studies attempted to investigate it by reproducing in laboratory settings phenomenological experiences that seem to closely resemble NDEs. So far, no study has induced NDE-like features via hypnotic modulation while simultaneously measuring changes in brain activity using high-density EEG. Five volunteers who previously had experienced a pleasant NDE were invited to re-experience the NDE memory and another pleasant autobiographical memory (dating to the same time period), in normal consciousness and with hypnosis. We compared the hypnosis-induced subjective experience with the one of the genuine experience memory. Continuous high-density EEG was recorded throughout. At a phenomenological level, we succeeded in recreating NDE-like features without any adverse effects. Absorption and dissociation levels were reported as higher during all hypnosis conditions as compared to normal consciousness conditions, suggesting that our hypnosis-based protocol increased the felt subjective experience in the recall of both memories. The recall of a NDE phenomenology was related to an increase of alpha activity in frontal and posterior regions. This study provides a proof-of-concept methodology for studying the phenomenon, enabling to prospectively explore the NDE-like features and associated EEG changes in controlled settings.


2004 ◽  
Vol 79 (1) ◽  
pp. 42-49 ◽  
Author(s):  
Eva Aagaard ◽  
Arianne Teherani ◽  
David M. Irby
Keyword(s):  

PLoS ONE ◽  
2021 ◽  
Vol 16 (9) ◽  
pp. e0256901
Author(s):  
James W. A. Strachan ◽  
Arianna Curioni ◽  
Merryn D. Constable ◽  
Günther Knoblich ◽  
Mathieu Charbonneau

The ability to transmit information between individuals through social learning is a foundational component of cultural evolution. However, how this transmission occurs is still debated. On the one hand, the copying account draws parallels with biological mechanisms for genetic inheritance, arguing that learners copy what they observe and novel variations occur through random copying errors. On the other hand, the reconstruction account claims that, rather than directly copying behaviour, learners reconstruct the information that they believe to be most relevant on the basis of pragmatic inference, environmental and contextual cues. Distinguishing these two accounts empirically is difficult based on data from typical transmission chain studies because the predictions they generate frequently overlap. In this study we present a methodological approach that generates different predictions of these accounts by manipulating the task context between model and learner in a transmission episode. We then report an empirical proof-of-concept that applies this approach. The results show that, when a model introduces context-dependent embedded signals to their actions that are not intended to be transmitted, it is possible to empirically distinguish between competing predictions made by these two accounts. Our approach can therefore serve to understand the underlying cognitive mechanisms at play in cultural transmission and can make important contributions to the debate between preservative and reconstructive schools of thought.


2015 ◽  
Author(s):  
Greg Jensen ◽  
Drew Altschul

In this opinion piece, we outline two shortcomings in experimental design that limit the claims that can be made about concept learning in animals. On the one hand, most studies of concept learning train too few concepts in parallel to support general claims about their capacity of subsequent abstraction. On the other hand, even studies that train many categories of stimulus in parallel only test one or two stimuli at a time, allowing even a simplistic learning rule to succeed by making informed guesses. To demonstrate these shortcomings, we include simulations performed using an off-the-shelf image classifier. These simulations demonstrate that, when either training or testing are overly simplistic, a classification algorithm that is incapable of abstraction nevertheless yields levels of performance that have been described in the literature as proof of concept learning in animals.


2021 ◽  
Author(s):  
An Su ◽  
Ling Wang ◽  
Xinqiao Wang ◽  
Chengyun Zhang ◽  
Hongliang Duan

<div> The study focuses on the proof-of-concept that the human invention of a named reaction can be reproduced by the zero-shot learning version of transformer.</div><div>While state-of-art reaction prediction machine learning models can predict chemical reactions through the transfer learning of thousands of training samples with the same reaction types as the ones to predict, how to prepare the models to predict truly "unseen" reactions remains a question. We aim to equip the transformer model with the ability to predict unseen reactions following the concept of "zero-shot learning". To find what kind of auxiliary information is needed, we reproduce the human invention of the Chan-Lam coupling reaction where the inventor was inspired by two existing reactions---Suzuki reaction and Barton's bismuth arylation reaction. After training with the samples from these two reactions as well as the USPTO dataset, the transformer model can pre-dict the Chan-Lam coupling reaction with 55.7% top-1 accuracy which is a huge im-provement comparing to 17.2% from the model trained with the USPTO dataset only. Our model also mimics the later stage of this history where the initial case of Chan-Lam coupling reaction was generalized to a wide range of reactants and reagents via the "one-shot learning" approach. The results of this study show that having existing reactions as auxiliary information can help the transformer predict unseen reactions and providing just one or few samples of the unseen reaction can boost the model's gener-alization ability.<br></div>


2019 ◽  
Vol 6 (5) ◽  
pp. 955-961 ◽  
Author(s):  
Hongfei Cheng ◽  
Nailiang Yang ◽  
Xiaozhi Liu ◽  
Qinbai Yun ◽  
Min Hao Goh ◽  
...  

ABSTRACT Phase engineering is arising as an attractive strategy to tune the properties and functionalities of nanomaterials. In particular, amorphous/crystalline heterophase nanostructures have exhibited some intriguing properties. Herein, the one-pot wet-chemical synthesis of two types of amorphous/crystalline heterophase PdCu nanosheets is reported, in which one is amorphous phase-dominant and the other one is crystalline phase-dominant. Then the aging process of the synthesized PdCu nanosheets is studied, during which their crystallinity increases, accompanied by changes in some physicochemical properties. As a proof-of-concept application, their aging effect on catalytic hydrogenation of 4-nitrostyrene is investigated. As a result, the amorphous phase-dominant nanosheets initially show excellent chemoselectivity. After aging for 14 days, their catalytic activity is higher than that of crystalline phase-dominant nanosheets. This work demonstrates the intriguing properties of heterophase nanostructures, providing a new platform for future studies on the regulation of functionalities and applications of nanomaterials by phase engineering.


2002 ◽  
Vol 12 (08) ◽  
pp. 1789-1812 ◽  
Author(s):  
SERGEJ ČELIKOVSKÝ ◽  
GUANRONG CHEN

This paper shows that a large class of systems, introduced in [Čelikovský & Vaněček, 1994; Vaněček & Čelikovský, 1996] as the so-called generalized Lorenz system, are state-equivalent to a special canonical form that covers a broader class of chaotic systems. This canonical form, called generalized Lorenz canonical form hereafter, generalizes the one introduced and analyzed in [Čelikovský & Vaněček, 1994; Vaněček & Čelikovský, 1996], and also covers the so-called Chen system, recently introduced in [Chen & Ueta, 1999; Ueta & Chen, 2000].Thus, this new generalized Lorenz canonical form contains as special cases the original Lorenz system, the generalized Lorenz system, and the Chen system, so that a comparison of the structures between two essential types of chaotic systems becomes possible. The most important property of the new canonical form is the parametrization that has precisely a single scalar parameter useful for chaos tuning, which has promising potential in future engineering chaos design. Some other closely related topics are also studied and discussed in the paper.


Algorithms ◽  
2020 ◽  
Vol 13 (9) ◽  
pp. 216
Author(s):  
Matteo Ceccarello ◽  
Andrea Pietracaprina ◽  
Geppino Pucci ◽  
Eli Upfal

We present an algorithm for approximating the diameter of massive weighted undirected graphs on distributed platforms supporting a MapReduce-like abstraction. In order to be efficient in terms of both time and space, our algorithm is based on a decomposition strategy which partitions the graph into disjoint clusters of bounded radius. Theoretically, our algorithm uses linear space and yields a polylogarithmic approximation guarantee; most importantly, for a large family of graphs, it features a round complexity asymptotically smaller than the one exhibited by a natural approximation algorithm based on the state-of-the-art Δ-stepping SSSP algorithm, which is its only practical, linear-space competitor in the distributed setting. We complement our theoretical findings with a proof-of-concept experimental analysis on large benchmark graphs, which suggests that our algorithm may attain substantial improvements in terms of running time compared to the aforementioned competitor, while featuring, in practice, a similar approximation ratio.


Sign in / Sign up

Export Citation Format

Share Document