There is an increasing number of natural and human-made disasters. There has also been increasing attention given to international disaster response laws. In a recently published study, the International Federation of...
详细信息
There is an increasing number of natural and human-made disasters. There has also been increasing attention given to international disaster response laws. In a recently published study, the International Federation of Red Cross and Red Crescent Societies stated that in mixed situations of disaster and conflict, international humanitarian law will prevail with international disaster response law instruments varying in their applicability. This paper examines whether in fact international humanitarian law is sufficient to deal with mixed situations, in particular, with relief efforts. The author concludes that international humanitarian law is useful as a basis, but other areas of law are essential in filling the gaps, particularly international disaster response laws. As such, the author believes emerging international disaster response law instruments should be encouraged to have a broad scope whereby these instruments include mixed situations too.
Contemporary parallel scientific codes often rely on message passing for inter-process communication. However, inefficient coding practices or multithreading (e.g., via MP I_THREAD_MULTIPLE) can severely stress the un...
详细信息
ISBN:
(纸本)9781728109121
Contemporary parallel scientific codes often rely on message passing for inter-process communication. However, inefficient coding practices or multithreading (e.g., via MP I_THREAD_MULTIPLE) can severely stress the underlying message processing infrastructure, resulting in potentially unacceptable impacts on application performance. In this article, we propose and evaluate a novel method for addressing this issue: 'Fuzzy Matching'. This approach has two components. First, it exploits the fact most server-class CPUs include vector operations to parallelize message matching. Second, based on a survey of point-to-point communication patterns in representative scientific applications, the method further increases parallelization by allowing matches based on 'partial truth', i.e., by identifying probable rather than exact matches. We evaluate the impact of this approach on memory usage and performance on Knight's Landing and Skylake processors. At scale (262,144 Intel Xeon Phi cores), the method shows up to 1.13 GiB of memory savings per node in the MPI library, and improvement in matching time of 95.9%;smaller-scale runs show run-time improvements of up to 31.0% for full applications, and up to 6.1% for optimized proxy applications.
Trusted Platform Module (TPM) provides the cryptographic functions through the application programming interfaces (APIs). The specification of APIs reflects the security policies of the designers, in order to manage a...
详细信息
ISBN:
(纸本)9780769536002
Trusted Platform Module (TPM) provides the cryptographic functions through the application programming interfaces (APIs). The specification of APIs reflects the security policies of the designers, in order to manage and protect the sensitive information of users, which is stored in the hardware module. But the security of these APIs has not guaranteed. In this paper, a formal model to describe the APIs based on the specification is proposed;based on the model, the attacker ability and the system security target are defined. In order to find the API-chain attack automatically, a formal method based on resolution principle and theorem proving is presented, and the method takes in practical using an automata theorem prover Otter;a mechanism of executability determination is also integrated in the method to alleviate state space explosion problem to some extent, and the state of TPM can be guaranteed The proposed theory and method are then applied in the Key Migration Module of TPM APIs to show the feasibility of this method.
This article scrutinizes the phrase 'all necessary means to protect civilians under threat of attack', contained in the United Nations (UN) Security Council Resolution 1973 (2011) authorizing military force in...
详细信息
This article scrutinizes the phrase 'all necessary means to protect civilians under threat of attack', contained in the United Nations (UN) Security Council Resolution 1973 (2011) authorizing military force in the Libyan Arab Jamahiriya (Libya). It assesses both the meaning of this phrase and the legal regime pursuant to the resolution. That regime challenges the teleological separation but concurrent application of the law on the use of force (the jus ad bellum), and the law applicable in international and non-international armed conflict [the jus in bello or international humanitarian law ( IHL)]. Security Council Resolution 1973, and its understanding of the term 'civilian', should be read in accordance with other international law norms;prima facie conflict of the resolution with IHL on the issue of targeting can be resolved. The resolution was however ambiguous on when force can be used. It is suggested that Resolution 1973 required a demonstrable risk of indiscriminate attack to civilians, per se necessity and jus ad bellum proportionality, the latter exceeding IHL's concept of proportionality because of the specificity of the resolution's aim. In examining the concurrent application of the jus ad bellum and the jus in bello in the context of specific interventions in Libya, the criticism that some states contributing coalition forces overstretched their mandate is corroborated. A combination of the resolution's ambiguity and political considerations lie at the heart of that overstretch. In developing international law for analogous situations, the intervention is likely to exacerbate existing quarrels over future council action to protect civilians.
applicationprogramming Interface (API) documents are a typical way of describing legal usage of reusable software libraries, thus facilitating software reuse. However, even with such documents, developers often overl...
详细信息
ISBN:
(纸本)9781467310673
applicationprogramming Interface (API) documents are a typical way of describing legal usage of reusable software libraries, thus facilitating software reuse. However, even with such documents, developers often overlook some documents and build software systems that are inconsistent with the legal usage of those libraries. Existing software verification tools require formal specifications (such as code contracts), and therefore cannot directly verify the legal usage described in natural language text in API documents against code using that library. However, in practice, most libraries do not come with formal specifications, thus hindering tool-based verification. To address this issue, we propose a novel approach to infer formal specifications from natural language text of API documents. Our evaluation results show that our approach achieves an average of 92% precision and 93% recall in identifying sentences that describe code contracts from more than 2500 sentences of API documents. Furthermore, our results show that our approach has an average 83% accuracy in inferring specifications from over 1600 sentences describing code contracts.
This paper presents a solution of integrator applicationprogramming interface (API) generator. The goal of the solution is to decrease the integration time required for the TR-069 support in an arbitrary device, by p...
详细信息
ISBN:
(纸本)9781479961917
This paper presents a solution of integrator applicationprogramming interface (API) generator. The goal of the solution is to decrease the integration time required for the TR-069 support in an arbitrary device, by providing an adaptive build system which generates API specific for the target device which is defined by a TR-106 data model specification. Evaluation results indicate that the implemented solution contributes to the decrease of integration time, based on the case of an example practical project in which TR-069 service is provided for an Android-based set-top box device.
Device-to-Device (D2D) communications feature ultra low latency and efficient resource utilization. D2D communications may be empowered by Multi-access Edge Computing (MEC) which brings cloud capabilities for storage ...
详细信息
ISBN:
(纸本)9781538646465
Device-to-Device (D2D) communications feature ultra low latency and efficient resource utilization. D2D communications may be empowered by Multi-access Edge Computing (MEC) which brings cloud capabilities for storage and processing into radio access network. In this paper, we present an approach to define RESTful interfaces for open access to proximity-based service, which may be used by mobile edge applications to initiate device proximity discovery and direct communications. The approach is illustrated by typical use cases, data model, interface definition and proximity-based service state models, which are formally described and verified.
暂无评论