Effective Floating-Point Analysis Via Weak-Distance

Total Page:16

File Type:pdf, Size:1020Kb

Effective Floating-Point Analysis Via Weak-Distance Effective Floating-Point Analysis via Weak-Distance Minimization Zhoulai Fu Zhendong Su IT University of Copenhagen, Denmark ETH Zurich, Switzerland [email protected] [email protected] Abstract ACM Reference Format: This work studies the connection between the problem of Zhoulai Fu and Zhendong Su. 2019. Effective Floating-Point Analy- analyzing floating-point code and that of function minimiza- sis via Weak-Distance Minimization. In Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Imple- tion. It formalizes this connection as a reduction theory, mentation (PLDI ’19), June 22–26, 2019, Phoenix, AZ, USA. ACM, New where the semantics of a floating-point program is measured York, NY, USA, 14 pages. https://doi.org/10.1145/3314221.3314632 as a generalized metric, called weak distance, which faith- fully captures any given analysis objective. It is theoretically guaranteed that minimizing the weak distance (e.g., via math- 1 Introduction ematical optimization) solves the underlying problem. This Modern infrastructures, from aerospace and robotics to fi- reduction theory provides a general framework for analyzing nance and physics, heavily rely on floating-point code. How- numerical code. Two important separate analyses from the ever, floating-point code is error-prone, and reasoning about literature, branch-coverage-based testing and quantifier-free its correctness has been a long-standing challenge. The main floating-point satisfiability, are its instances. difficulty stems from the subtle, albeit well-known, semantic To further demonstrate our reduction theory’s generality discrepancies between floating-point and real arithmetic. For and power, we develop three additional applications, includ- example, the associativity rule in real arithmetic a + ¹b +cº = ing boundary value analysis, path reachability and overflow ¹a + bº + c does not hold in floating-point arithmetic.1 Con- detection. Critically, these analyses do not rely on the mod- sider the C code in Fig.1(a) for a further motivating exam- eling or abstraction of floating-point semantics; rather, they ple. We assume the rounding mode is the default round-to- explore a program’s input space guided by runtime compu- nearest as defined in the IEEE-754 standard. The code may tation and minimization of the weak distance. This design, appear correct upon first sight. However, if we set the input combined with the aforementioned theoretical guarantee, to 0:999 999 999 999 999 9, the branch “if (x < 1)” will be enables the application of the reduction theory to real-world taken, but the subsequent “assert (x + 1 < 2)” will fail floating-point code. In our experiments, our boundary value (x + 1 = 2 in this case). Now, if we run the same code un- analysis is able to find all reachable boundary conditions der a different rounding mode, say round-toward-zero, the of the GNU sin function, which is complex with several assertion becomes valid. hundred lines of code, and our floating-point overflow de- tection detects a range of overflows and inconsistencies in void Prog(double x) { void Prog(double x) { the widely-used numerical library GSL, including two latent if (x < 1){ if (x < 1){ bugs that developers have already confirmed. x = x + 1; x = x + tan(x); assert(x < 2); assert(x < 2); CCS Concepts • Theory of computation → Program }} }} analysis. (a) (b) Keywords Program Analysis, Mathematical Optimization, Theoretical Guarantee, Floating-point Code Figure 1. Motivating examples: Do the assertions hold? Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not To reason about such counterintuitive floating-point be- made or distributed for profit or commercial advantage and that copies bear havior, one may believe that a formal semantic analysis is this notice and the full citation on the first page. Copyrights for components necessary. Indeed, state-of-the-art SMT solvers such as Math- of this work owned by others than ACM must be honored. Abstracting with SAT [10] can determine that the floating-point constraint credit is permitted. To copy otherwise, or republish, to post on servers or to x < ^ x + ≥ redistribute to lists, requires prior specific permission and/or a fee. Request 1 1 2 is satisfiable under the round-to-nearest permissions from [email protected]. mode and unsatisfiable under the round-toward-zero mode. PLDI ’19, June 22–26, 2019, Phoenix, AZ, USA However, the tight coupling between analysis and semantics © 2019 Association for Computing Machinery. ACM ISBN 978-1-4503-6712-7/19/06...$15.00 1One may verify that, on a typical x86-64 machine with the round-to-nearest https://doi.org/10.1145/3314221.3314632 mode, 0:1+¹0:2+0:3º = 0:6, but ¹0:1+0:2º+0:3 = 0:600 000 000 000 000 1. PLDI ’19, June 22–26, 2019, Phoenix, AZ, USA Zhoulai Fu and Zhendong Su can quickly become problematic for real-world code involv- program equivalently as the optimization problem of an- ing floating-point arithmetic operations, nonlinear relations, other floating-point program. or transcendental functions. Suppose we change “x = x + • We study three instances of the theory, including bound- 1” to “x = x + tan(x)” as shown in Fig.1(b). SMT-based ary value analysis, path reachability, and floating-point methods will find it difficult to reason about tan(x) because overflow detection. These problems are known to beim- the implementation of tan(x) is system-dependent, and its portant, challenging, and have been treated separately in semantics is not standardized in IEEE-754 [1]. the literature. The proposed reduction technique allows us Recent work has introduced two highly effective floating- to approach these distinct problems uniformly in the same point analyses that do not need to directly reason about theory and to effectively realize them under a common program logic [16, 17]. Both analyses drastically outper- implementation architecture. form traditional techniques. The first is for achieving high • We conduct a set of experiments to empirically validate branch coverage in floating-point code [17]. It transforms the our approach. Our boundary value analysis is able to trig- program under test into another program whose minimum ger all reachable boundary conditions of the GNU sin points trigger uncovered conditional branches. The analysis function, which is complex with several hundred lines of achieves an average of 90%+ branch coverage within seconds code. Our floating-point overflow detection has detected a on Sun’s math library code. The second concerns floating- range of overflows, inconsistencies, and two latent, already point constraint satisfiability [16]. A floating-point formula confirmed bugs in the widely-used GSL. in conjunctive normal form (CNF) is transformed into a pro- To facilitate the exposition of our approach and its repro- gram whose minimum points correspond to the models of duction, we provide a variety of examples throughout the the formula. A Monte Carlo optimization backend is applied paper. We believe that these examples also help inform the to find these models, if any. The solver produces consistent reader both our approach’s strengths and limitations. satisfiability results as both MathSAT and Z3 with average The rest of the paper is organized as follows. Section2 for- speedups of over 700X on SMT-competition benchmarks. mulates the problem, and Section3 develops our reduction This work generalizes these ideas and develops a unified theory. Section4 illustrates the theory with three examples. theory that applies to a broad category of floating-point anal- Section5 lays out the implementation architecture and dis- ysis problems. The theory consists of a faithful reduction cuss the limitations of our approach, while Section6 presents procedure from the problem domain of floating-point anal- our experiments and results. Section7 surveys related work, ysis to the problem domain of mathematical optimization. and finally Section8 concludes. At the core of theory, floating-point program semantics is measured as a generalized metric called weak distance, and it Notation. As usual, we denote the set of integers and real is guaranteed that minimizing the weak distance, such as via numbers by Z and R respectively. We write F for the set of mathematical optimization (MO), leads to a solution to the floating-point numbers of the IEEE-754 binary64 format. underlying floating-point analysis problem, and vice versa. We will often write x® to represent an N-dimensional floating- Our reduction offers a key practical benefit. As modern N point vectors ¹x1;:::; xN º in F . MO techniques work by executing an objective function, our approach does not need to analyze floating-point program se- 2 Floating-Point Analysis mantics, an intractable and potentially cost-ineffective task. Instead, it directs input space exploration by executing an- The term floating-point analysis in this paper refers to a other, potentially simpler floating-point program that models broad class of problems in program analysis, testing, and the weak distance to capture the desired analysis objective. verification, where the goal is to determine if floating-point It is a common misconception that MO is useful only for program is correct or has some desired properties. In this continuous objective functions — continuity is preferred, but section, we first briefly review the semantic constructs of not necessary. Modern, advanced algorithms exist that can the problem, formulate, and then frame it as a problem of handle functions with discontinuity, high-dimensionality, finding unsafe inputs. We show five instances of the defined or time-consuming computation. Our approach uses MO problem, three of which will be studied in later sections (the techniques as black-boxes and can directly benefit from the other two were explored in the literature). state-of-the-art. Our main contributions follow: 2.1 Problem Formulation • We develop a reduction theory for floating-point analysis A large body of research on floating-point analysis can be via mathematical optimization.
Recommended publications
  • Chinese Privatization: Between Plan and Market
    CHINESE PRIVATIZATION: BETWEEN PLAN AND MARKET LAN CAO* I INTRODUCTION Since 1978, when China adopted its open-door policy and allowed its economy to be exposed to the international market, it has adhered to what Deng Xiaoping called "socialism with Chinese characteristics."1 As a result, it has produced an economy with one of the most rapid growth rates in the world by steadfastly embarking on a developmental strategy of gradual, market-oriented measures while simultaneously remaining nominally socialistic. As I discuss in this article, this strategy of reformthe mere adoption of a market economy while retaining a socialist ownership baseshould similarly be characterized as "privatization with Chinese characteristics,"2 even though it departs markedly from the more orthodox strategy most commonly associated with the term "privatization," at least as that term has been conventionally understood in the context of emerging market or transitional economies. The Russian experience of privatization, for example, represents the more dominant and more favored approach to privatizationcertainly from the point of view of the West and its advisersand is characterized by immediate privatization of the state sector, including the swift and unequivocal transfer of assets from the publicly owned state enterprises to private hands. On the other hand, "privatization with Chinese characteristics" emphasizes not the immediate privatization of the state sector but rather the retention of the state sector with the Copyright © 2001 by Lan Cao This article is also available at http://www.law.duke.edu/journals/63LCPCao. * Professor of Law, College of William and Mary Marshall-Wythe School of Law. At the time the article was written, the author was Professor of Law at Brooklyn Law School.
    [Show full text]
  • Effect of Marine Bacillus BC-2 on the Health-Beneficial Ingredients of Flavor Liquor
    Food and Nutrition Sciences, 2019, 10, 606-612 http://www.scirp.org/journal/fns ISSN Online: 2157-9458 ISSN Print: 2157-944X Effect of Marine Bacillus BC-2 on the Health-Beneficial Ingredients of Flavor Liquor Yueming Li*, Jianchun Xu, Zhimei Xu Qingdao Langyatai Group Co., Ltd., Qingdao, China How to cite this paper: Li, Y.M., Xu, J.C. Abstract and Xu, Z.M. (2019) Effect of Marine Ba- cillus BC-2 on the Health-Beneficial Ingre- The main aroma component of Luzhou-flavor Liquor is ethyl caproate, which dients of Flavor Liquor. Food and Nutrition is combined with appropriate amount of ethyl butyrate, ethyl acetate, ethyl Sciences, 10, 606-612. lactate and so on. By adding the marine bacillus BC-2 (Accession number: https://doi.org/10.4236/fns.2019.106044 MK811408) to substrate sludge, the bacillus complex bacterial liquid (pit Mud Received: March 27, 2019 Functional Bacterial liquid) has been modified. The complex bacterial liquid Accepted: June 11, 2019 was used in the production of Luzhou-flavor Liquor and it dramatically pro- Published: June 14, 2019 moted the content of health-beneficial ingredients in the new workshop. These results demonstrated that the marine bacillus BC-2 can effectively im- Copyright © 2019 by author(s) and prove the quality and health benefit of Luzhou-flavor Liquor. Scientific Research Publishing Inc. This work is licensed under the Creative Commons Attribution International Keywords License (CC BY 4.0). Luzhou-Flavor Liquor, Marine Bacillus BC-2, Flavoring Components http://creativecommons.org/licenses/by/4.0/ Open Access 1. Introduction In China, Luzhou-flavor Liquor is the most widely used Luzhou-flavor Liquor in social intercourse and its taste is closely related to the quality of pit mud.
    [Show full text]
  • Archaeological Observation on the Exploration of Chu Capitals
    Archaeological Observation on the Exploration of Chu Capitals Wang Hongxing Key words: Chu Capitals Danyang Ying Chenying Shouying According to accurate historical documents, the capi- In view of the recent research on the civilization pro- tals of Chu State include Danyang 丹阳 of the early stage, cess of the middle reach of Yangtze River, we may infer Ying 郢 of the middle stage and Chenying 陈郢 and that Danyang ought to be a central settlement among a Shouying 寿郢 of the late stage. Archaeologically group of settlements not far away from Jingshan 荆山 speaking, Chenying and Shouying are traceable while with rice as the main crop. No matter whether there are the locations of Danyang and Yingdu 郢都 are still any remains of fosses around the central settlement, its oblivious and scholars differ on this issue. Since Chu area must be larger than ordinary sites and be of higher capitals are the political, economical and cultural cen- scale and have public amenities such as large buildings ters of Chu State, the research on Chu capitals directly or altars. The site ought to have definite functional sec- affects further study of Chu culture. tions and the cemetery ought to be divided into that of Based on previous research, I intend to summarize the aristocracy and the plebeians. The relevant docu- the exploration of Danyang, Yingdu and Shouying in ments and the unearthed inscriptions on tortoise shells recent years, review the insufficiency of the former re- from Zhouyuan 周原 saying “the viscount of Chu search and current methods and advance some personal (actually the ruler of Chu) came to inform” indicate that opinion on the locations of Chu capitals and later explo- Zhou had frequent contact and exchange with Chu.
    [Show full text]
  • Temporal Perception Deficits in Schizophrenia: Integration Is the Problem, Not Deployment of Attentions', Scientific Reports, Vol
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Birmingham Research Portal University of Birmingham Temporal perception deficits in schizophrenia Su, Li; Wyble, Brad; Zhou, Lai-Quan; Wang, Kui; Wang, Yu-Na; Cheung, Eric F C; Bowman, Howard; Chan, Raymond C K DOI: 10.1038/srep09745 License: Creative Commons: Attribution (CC BY) Document Version Publisher's PDF, also known as Version of record Citation for published version (Harvard): Su, L, Wyble, B, Zhou, L-Q, Wang, K, Wang, Y-N, Cheung, EFC, Bowman, H & Chan, RCK 2015, 'Temporal perception deficits in schizophrenia: integration is the problem, not deployment of attentions', Scientific Reports, vol. 5, 9745. https://doi.org/10.1038/srep09745 Link to publication on Research at Birmingham portal Publisher Rights Statement: This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. Eligibility for repository: checked 09/09/2015 General rights Unless a licence is specified above, all rights (including copyright and moral rights) in this document are retained by the authors and/or the copyright holders. The express permission of the copyright holder must be obtained for any use of this material other than for purposes permitted by law. •Users may freely distribute the URL that is used to identify this publication.
    [Show full text]
  • Discovering Discrepancies in Numerical Libraries
    Discovering Discrepancies in Numerical Libraries Jackson Vanover Xuan Deng Cindy Rubio-González University of California, Davis University of California, Davis University of California, Davis United States of America United States of America United States of America [email protected] [email protected] [email protected] ABSTRACT libraries aim to offer a certain level of correctness and robustness in Numerical libraries constitute the building blocks for software appli- their algorithms. Specifically, a discrete numerical algorithm should cations that perform numerical calculations. Thus, it is paramount not diverge from the continuous analytical function it implements that such libraries provide accurate and consistent results. To that for its given domain. end, this paper addresses the problem of finding discrepancies be- Extensive testing is necessary for any software that aims to be tween synonymous functions in different numerical libraries asa correct and robust; in all application domains, software testing means of identifying incorrect behavior. Our approach automati- is often complicated by a deficit of reliable test oracles and im- cally finds such synonymous functions, synthesizes testing drivers, mense domains of possible inputs. Testing of numerical software and executes differential tests to discover meaningful discrepan- in particular presents additional difficulties: there is a lack of stan- cies across numerical libraries. We implement our approach in a dards for dealing with inevitable numerical errors, and the IEEE 754 tool named FPDiff, and provide an evaluation on four popular nu- Standard [1] for floating-point representations of real numbers in- merical libraries: GNU Scientific Library (GSL), SciPy, mpmath, and herently introduces imprecision. As a result, bugs are commonplace jmat.
    [Show full text]
  • 2019 China Military Power Report
    OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People’s Republic of China 2019 Office of the Secretary of Defense Preparation of this report cost the Department of Defense a total of approximately $181,000 in Fiscal Years 2018-2019. This includes $12,000 in expenses and $169,000 in DoD labor. Generated on 2019May02 RefID: E-1F4B924 OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China OFFICE OF THE SECRETARY OF DEFENSE Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2019 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended Section 1260, “Annual Report on Military and Security Developments Involving the People’s Republic of China,” of the National Defense Authorization Act for Fiscal Year 2019, Public Law 115-232, which amends the National Defense Authorization Act for Fiscal Year 2000, Section 1202, Public Law 106-65, provides that the Secretary of Defense shall submit a report “in both classified and unclassified form, on military and security developments involving the People’s Republic of China. The report shall address the current and probable future course of military-technological development of the People’s Liberation Army and the tenets and probable development of Chinese security strategy and military strategy, and of the military organizations and operational concepts supporting such development over the next 20 years.
    [Show full text]
  • Lihua Xu, Ph.D
    Curriculum Vitae LIHUA XU, PH.D. 400 Palisades Circle, Apt. 202 Asheville, NC 28803 Email: [email protected] Cell: 407-808-2675 EDUCATION Ph.D. December 2009 Oklahoma State University - Stillwater, OK Specialization: Research and Evaluation, Educational Psychology Certificate: TESOL / Linguistics Dissertation: Measurement Invariance of the Inventory of School Motivation across Chinese and American College Students M.A. 2003 Sun Yat-sen University - Guangdong, China TESOL / Linguistics B.A. 1998 Sichuan University - Sichuan, China English ACADEMIC EMPLOYMENT 2017 – present Assistant Professor in Educational Research Western Carolina University, College of Education and Allied Professions Department of Human Services, Educational Leadership Ed.D. program 2010-2017 Lecturer and Statistics Lab Coordinator University of Central Florida, College of Education and Human Performance, Department of Educational and Human Sciences, Methodology Measurement and Analysis Courses Taught 2017- present Western Carolina University ⋅ Multiple Regression (EDL 793) ⋅ Design and Analysis of Educational Research (EDRS 802) ⋅ Data Representation (EDRS 805) ⋅ Classroom Assessment for Student Learning (EDRS 709) ⋅ Methods of Research (EDRS 602) 2010-2017 University of Central Florida, Educational and Human Sciences – Orlando, FL ⋅ Fundamentals of Graduate Research in Education (EDF 6481) ⋅ Measurement and Evaluation in Education (EDF 6432) ⋅ Statistics for Educational Data (EDF 6401) ⋅ Mixed Methods for Evaluation (EDF 6464) 2003-2009 Oklahoma State University, Research and Evaluation – Stillwater, OK Research Design and Methodology (REMS 5013) Oklahoma State University, English Department – Stillwater, OK International Composition I (ENGL 1113) International Composition II (ENGL 1223) Peer-Reviewed Journal Articles (13 articles) * Indicates invited 1. Hayles, O., Xu, L., & Edwards, O. W. (2018). Family structures, family relationship, and children’s perceptions of life satisfaction.
    [Show full text]
  • The Analects of Confucius
    The analecTs of confucius An Online Teaching Translation 2015 (Version 2.21) R. Eno © 2003, 2012, 2015 Robert Eno This online translation is made freely available for use in not for profit educational settings and for personal use. For other purposes, apart from fair use, copyright is not waived. Open access to this translation is provided, without charge, at http://hdl.handle.net/2022/23420 Also available as open access translations of the Four Books Mencius: An Online Teaching Translation http://hdl.handle.net/2022/23421 Mencius: Translation, Notes, and Commentary http://hdl.handle.net/2022/23423 The Great Learning and The Doctrine of the Mean: An Online Teaching Translation http://hdl.handle.net/2022/23422 The Great Learning and The Doctrine of the Mean: Translation, Notes, and Commentary http://hdl.handle.net/2022/23424 CONTENTS INTRODUCTION i MAPS x BOOK I 1 BOOK II 5 BOOK III 9 BOOK IV 14 BOOK V 18 BOOK VI 24 BOOK VII 30 BOOK VIII 36 BOOK IX 40 BOOK X 46 BOOK XI 52 BOOK XII 59 BOOK XIII 66 BOOK XIV 73 BOOK XV 82 BOOK XVI 89 BOOK XVII 94 BOOK XVIII 100 BOOK XIX 104 BOOK XX 109 Appendix 1: Major Disciples 112 Appendix 2: Glossary 116 Appendix 3: Analysis of Book VIII 122 Appendix 4: Manuscript Evidence 131 About the title page The title page illustration reproduces a leaf from a medieval hand copy of the Analects, dated 890 CE, recovered from an archaeological dig at Dunhuang, in the Western desert regions of China. The manuscript has been determined to be a school boy’s hand copy, complete with errors, and it reproduces not only the text (which appears in large characters), but also an early commentary (small, double-column characters).
    [Show full text]
  • The Davie Record DAVIB COUNTY’S ODDEST NBWSPAPER-THE PAPER the BEOPDE READ
    The Davie Record DAVIB COUNTY’S ODDEST NBWSPAPER-THE PAPER THE BEOPDE READ NEWS OF LONG AGO. AT PEACE WITH GOO Connty Has Hnge Joh CooIeemee Christmas Is The War Over? Seen AlongMain Street Rev. Walter E. henhonr. Hiddenite.!). C. More than $370,000 is expected Party Great Success Fighting for au ally of - Aineri ByTheStteetRanibler. Wbat Was Happemag In Davie The heart: and soul at peace with to be spent during the next five ca dvrihg the~w<ir is one thing and oooooo BK HARRY S. STROUD. - Before Tbe New Deal UsedVp God years by Davie County home own­ fighting tor one half j of China a Miss Ruth Lakey ‘wearing new The Christmas party for the Has’pleasures sweet aloug life’s ers on remodeliug and repair work. gainst the other half in a civil war pair of rubber boots—Cjarence Tbe Alphabet, Drowned The children of Erwin mill workers at way, The year 1946 promises to inau­ is another: Craven looking happy after foe - Hapaaad Plowed Up .The Cooleemee which, was igld at the Although sometimes ,affliction’s gurate one of the greatest areas in ...That’s what’, American.... aiimen holidays—Herbert Haire shaking Cottoa and Cora. rod . American history, for., home iool building Saturday tbmk.. reported angrily protistlng Handgwkh ^ iends-M fcs Hazel pairs and modernization, accord­ evening, Dee. 22, was a great sue- (Davie Record, Jan. 5. 1910) May seem quite heavy for die their postwar assignment to fly Mcdamroch driving slowly acrois ing to estimates 'released by the cess. The party was sponsored by Cotton ls 13 cents.
    [Show full text]
  • 1909-07-26 [P
    ■ ■ ■ — —— 1 »» mmtmmmmm July 10th, store closed Saturdays at noon, during July ΠΝ the realms of his majesty (Beginning and August. Open Friday evenings. KINC EDWARD THE SEVENTH Evening News Party of Young Ladies Will View Many In- i teresting Sights and Scenes—"An Opportunity that Might Wei be Coveted by Anyone" Says a Prom- inent Educator-First Count of Votes Will be Made Saturday Evening, July 31. Now in Progress L GIVE YOUR FAVORITE YOUNG LADY ACOODSEND-OFF Anty Drudge Tells How to Avoid The Greatest August The plan of the EVENING NEWS IMss Ingabord Oksen Mies Lyda Lyttle Sunday Soaking. to send abroad tea young ladies for Miss Charlotte Law Mise Margaret Williams Mrs. Hurryup—"I always put my clothes to soak on Sun- a trip to the tropics continues to ex- Miss Tina Friedman Mira Nellie Knott cite comment throughout the city Miss Florence Gassmati Misa Ιλο Reed day night. Then I get an early start on Monday and Furniture Sale and county. Miss Florence Sofleld Mise May Ludwlg get through washing by noon. I don't consider it The offer seems so generous and Miss Maude Sofleld Miss Beatrice William· Ever Held in Newark breaking the for cleanliness is next to the plan so praiseworthy that, as the Miss Lulu Dunham Mies Mabel Corson Sabbath, god- features come more and more gener- Mies Louise Dover Miss Anna Fountain liness, you know." A stock of Grade known the venture Miss Emma Fraser Mies Grace Braden gigantic High Furnittfre, Carpets, ally the success of 'Anty Drudge—"Yee, but godliness comes first, my dear.
    [Show full text]
  • Modification of Einstein a Coefficient in Dissipative Gas Medium Cao
    f f J / , / -- Modification of Einstein A coefficient in dissipative gas medium Cao Chang-qi Department of Physics, Peking University, Beijing 100871 Cao Hui (H.Cao) Edward L. Ginzton Laboratory, Stanford University, Stanford,CA 94305,USA Qin Ke-cheng Department of Physics, Peking University, Beijing 100871. Abstract Spontaneous radiation in dissipative gas medium such as plasmas is investigated by Langevin equations and the modified Weisskopf-Wigner approximation. Since the refrac- tive index of gas medium is expected to be nearly unity, we shall first neglect the medium polarization effect. We show that absorption in plasmas may in certain case modify the Einstein A coefficient significantly and cause a pit in the A coefficient-density curves for relatively low temperature plasmas and also a pit in the A coefficient-temperature curves. In the next, the effect of medium polarization is taken into account in addition. To our surprise, its effect in certain case is quite significant. The dispersive curves show different behavious in different region of parameters. 1 Introduction This work is motivated by an effect called by the original authors [11as "quenching of Einstein A coefficient": the ratio of two line intensities I(580520 and I(31221) from a common upper level of Cxy is reduced by an order of magnitude when the eletron density Are changes from 101S/cm a to 1019/cm a. But there is some dispute about the interpretation of their experiments. Our work is to see whether this effect is possible theoretically. Physically, spontaneous emission is resulted from atom (ion) with "vacuum" electromagnetic field, therefore Einstrein A coefficient is a characteristic parameter of the total atom-field system, not just of atom itself.
    [Show full text]
  • Achieving High Coverage for Floating-Point Code Via Unconstrained Programming
    Achieving High Coverage for Floating-Point Code via Unconstrained Programming Zhoulai Fu Zhendong Su University of California, Davis, USA [email protected] [email protected] Abstract have driven the research community to develop a spectrum Achieving high code coverage is essential in testing, which of automated testing techniques for achieving high code gives us confidence in code quality. Testing floating-point coverage. code usually requires painstaking efforts in handling floating- A significant challenge in coverage-based testing lies in point constraints, e.g., in symbolic execution. This paper turns the testing of numerical code, e.g., programs with floating- the challenge of testing floating-point code into the oppor- point arithmetic, non-linear variable relations, or external tunity of applying unconstrained programming — the math- function calls, such as logarithmic and trigonometric func- ematical solution for calculating function minimum points tions. Existing solutions include random testing [14, 23], over the entire search space. Our core insight is to derive a symbolic execution [17, 24], and various search-based strate- representing function from the floating-point program, any of gies [12, 25, 28, 31], which have found their way into many whose minimum points is a test input guaranteed to exercise mature implementations [16, 39]. Random testing is easy to a new branch of the tested program. This guarantee allows employ and fast, but ineffective in finding deep semantic is- us to achieve high coverage of the floating-point program by sues and handling large input spaces; symbolic execution and repeatedly minimizing the representing function. its variants can perform systematic path exploration, but suf- We have realized this approach in a tool called CoverMe fer from path explosion and are weak in dealing with complex and conducted an extensive evaluation of it on Sun’s C math program logic involving numerical constraints.
    [Show full text]