- Real-Time Systems Scheduling
- Parallel Computing and Optimization Techniques
- Advanced Malware Detection Techniques
- Embedded Systems Design Techniques
- bioluminescence and chemiluminescence research
- Web Application Security Vulnerabilities
- Agricultural Innovations and Practices
- Software Testing and Debugging Techniques
- Distributed systems and fault tolerance
- Software Reliability and Analysis Research
- Psychology of Moral and Emotional Judgment
- Software Engineering Research
- Security and Verification in Computing
- Economic Growth and Development
- Poverty, Education, and Child Welfare
- Social and Intergroup Psychology
- Network Security and Intrusion Detection
- Personality Traits and Psychology
- Land Rights and Reforms
- Microfinance and Financial Inclusion
- Culture, Economy, and Development Studies
- PI3K/AKT/mTOR signaling in cancer
- Chemical Reactions and Isotopes
- BRCA gene mutations in cancer
- Experimental Behavioral Economics Studies
Federal Ministry for Economic Affairs and Climate Action
2021
Institute of Neurobiology
2020
McLean Hospital
2017-2020
Harvard University
2017-2020
University of Turin
2018-2020
Technical University of Denmark
2014-2016
VA Boston Healthcare System
2016
Ball (France)
2014
National Superconducting Cyclotron Laboratory
2014
Michigan State University
2014
Three experiments demonstrated that feeling wronged leads to a sense of entitlement and selfish behavior. In Experiment 1, participants instructed recall time when their lives were unfair more likely refuse help the experimenter with supplementary task than who recalled they bored. 2, same manipulation increased intentions engage in number behaviors, this effect was mediated by self-reported obtain positive (and avoid negative) outcomes. 3, lost at computer game for an reason (a glitch...
Five studies tested the relationship between narcissism and support for hierarchy. Narcissism was associated with endorsing group-based hierarchy, income inequality, hierarchy in business (Studies 1a–1b) liking organizations a hierarchical structure 2a–2b). Analyses suggested that more narcissistic participants’ preference may have been due at least partly to their current high standing or expectation they will rise rank When participants learned about an organization where it possible...
Probabilistic forecasts in the form of probability distributions over future events have become popular several fields including meteorology, hydrology, economics, and demography. In typical applications, many alternative statistical models data sources can be used to produce probabilistic forecasts. Hence, evaluating selecting among competing methods is an important task. The scoringRules package for R provides functionality comparative evaluation based on proper scoring rules, covering a...
Six studies examined the relationship between psychological entitlement and not following instructions. In Study 1, more entitled individuals were likely to ignore instructions about how format their responses. Studies 2–4 investigated possible boundaries on association ignoring instructions; however, people even when was low cost for self, given in a less controlling way, or punishment highly result from failure follow To explore another explanation instructions, 5 whether sensitive...
Utilizing a stack cache in real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed hits, explicit operations responsible for managing The behavior of these be analyzed statically. We present algorithms derive worst-case bounds latency-inducing Their results used static WCET tool. By breaking analysis down into subproblems solve intra-procedural data-flow path searches call-graph, efficiently yet...
Node.js took JavaScript from the browser to server-side web applications, and injection vulnerabilities are now commonly reported in modules. However, existing taint analysis approaches for require extensive manual modelling, fail analyse simple applications that contain hundreds of third-party For this reason, we developed AFFOGATO, a robust practical grey-box tool uses black-box reasoning overcome need modelling while using white-box program reason about critical operations. We evaluate...
With the increasing performance demand in real-time systems it becomes more and relevant to provide feedback engineers programmers, but also software development tools, on performance-relevant code parts of a program. So far, information provided programmers through tools was limited an estimation worst-case execution time (WCET) its associated path (WCEP). However, these metrics only partial information. Only those that are one WCEPs indicated programmer. No is for all other parts. To give...
Abstract interpretation is a well established theory that supports reasoning about the run-time behaviour of programs. It achieves tractable by considering abstractions states, rather than states themselves. The chosen set referred to as abstract domain. We develop novel framework for combining (a possibly large number of) domains. effect so-called reduced product without requiring quadratic functions translate information among A central notion reference domain, medium exchange. Our...
The popularity of the PDF format and rich JavaScript environment that viewers offer make documents an attractive attack vector for malware developers. present a serious threat to security organizations because most users are unsuspecting them thus likely open from untrusted sources. We propose identify malicious PDFs by using conservative abstract interpretation statically reason about behavior embedded code. Currently, state-of-the-art tools either: (1) based on structural similarity known...
If-conversion is a simple yet powerful optimization that converts control dependences into data dependences. It allows elimination of branches and increases available instruction level parallelism thus overall performance. can either be applied alone or in combination with other techniques increase the size scheduling regions. The presence hardware support for predicated execution if-conversion to broadly given program. This makes it necessary guide using heuristic estimates regarding its...
The popularity of the PDF format and rich JavaScript environment that viewers offer make documents an attractive attack vector for malware developers. present a serious threat to security organizations because most users are unsuspecting them thus likely open from untrusted sources.
The paper analyses the efficiency of extension programs in adoption chemical fertilisers Ethiopia between 1994 and 2004. Fertiliser provides a suitable strategy to ensure stabilize food production remote vulnerable areas. Extension services have long history supporting application fertiliser. How-ever, their is questioned. In our analysis, we focus on seven villages with considerable time lag fertiliser diffusion. Using matching techniques avoids sample selection bias comparison treated...
Static analysis tools that are used for worst-case execution time (WCET) of real-time software just provide partial information on an analyzed program. Only the longest-executing path, which currently determines WCET bound is indicated to programmer. This limited view can prevent a programmer (or compiler) from targeting optimizations right way. A possible resort use metric targets and be efficiently computed all code parts Similar dynamic profiling techniques, execute with input typically...
Modern software heavily relies on the use of components. Those components are usually published in central repositories, and managed by build systems via dependencies. Due to issues around vulnerabilities, licenses propagation bugs, study those dependencies is utmost importance, numerous composition analysis tools have emerged for this purpose. A particular challenge hidden that result cloning or shading where code from a component "inlined", and, case shading, moved different namespaces. We...
Nowadays, industrial research labs operate like startups. In a relatively short amount of time, researchers are expected not only to explore innovative ideas but also show how the new can add value organisation. One way do this, especially when developing tools, is construct usable prototypes. When technology underlying tool highly complex or niche, program analysis, field trials with potential users help explaining and demonstrating benefits tool. Getting support from helps demonstrate...