There's Plenty of Room for Unconventional Programming
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Lecture Notes: the Mathematics of Phylogenetics
Lecture Notes: The Mathematics of Phylogenetics Elizabeth S. Allman, John A. Rhodes IAS/Park City Mathematics Institute June-July, 2005 University of Alaska Fairbanks Spring 2009, 2012, 2016 c 2005, Elizabeth S. Allman and John A. Rhodes ii Contents 1 Sequences and Molecular Evolution 3 1.1 DNA structure . .4 1.2 Mutations . .5 1.3 Aligned Orthologous Sequences . .7 2 Combinatorics of Trees I 9 2.1 Graphs and Trees . .9 2.2 Counting Binary Trees . 14 2.3 Metric Trees . 15 2.4 Ultrametric Trees and Molecular Clocks . 17 2.5 Rooting Trees with Outgroups . 18 2.6 Newick Notation . 19 2.7 Exercises . 20 3 Parsimony 25 3.1 The Parsimony Criterion . 25 3.2 The Fitch-Hartigan Algorithm . 28 3.3 Informative Characters . 33 3.4 Complexity . 35 3.5 Weighted Parsimony . 36 3.6 Recovering Minimal Extensions . 38 3.7 Further Issues . 39 3.8 Exercises . 40 4 Combinatorics of Trees II 45 4.1 Splits and Clades . 45 4.2 Refinements and Consensus Trees . 49 4.3 Quartets . 52 4.4 Supertrees . 53 4.5 Final Comments . 54 4.6 Exercises . 55 iii iv CONTENTS 5 Distance Methods 57 5.1 Dissimilarity Measures . 57 5.2 An Algorithmic Construction: UPGMA . 60 5.3 Unequal Branch Lengths . 62 5.4 The Four-point Condition . 66 5.5 The Neighbor Joining Algorithm . 70 5.6 Additional Comments . 72 5.7 Exercises . 73 6 Probabilistic Models of DNA Mutation 81 6.1 A first example . 81 6.2 Markov Models on Trees . 87 6.3 Jukes-Cantor and Kimura Models . -
TRANSCRIPT Applications
Presidential Commission for the Study of Bioethical Issues TRANSCRIPT Applications J. Craig Venter, Ph.D. Founder and President, J. Craig Venter Institute George Church, Ph.D. Professor of Genetics, Harvard Medical School Kristala L. J. Prather, Ph.D. Assistant Professor, Dept. of Chemical Engineering, Massachu- setts Institute of Technology Meeting 1, Session 2 July 8, 2010 Washington, D.C. Jim Wagner: Could we have our speakers come to the table. And if others could take their chairs, we’ll get under way. Thank you. Commission members, we need you as well, actually. I see them filter- ing up. I saw Nita out there. And there’s Bonnie in the back of the room. So that there is ample time for our speakers to present and for us to ask questions, let’s do get under way. Really, again, appreciate this morning’s conversation and the presenta- tions, helping us to — wow. Helping us to define what is and is not synthetic biology and to understand a little bit more about some of the science involved. This particular session, we are going to focus and we have asked our experts to focus more on applications. We’ll try to use a similar format. Have our speakers present for a brief period. You have the timer in front of you. Make sure after all of you have pre- sented the commission has time to ask questions. And then we’ll try to throw it open — not try to – we will, certainly, throw it open to the public for other questions they may have. -
Driving Diffusion of Scientific Innovation
Driving Diffusion of Scientific Innovation - The Role of Institutional Entrepreneurship and Open Science in Synthetic Biology Vom Promotionsausschuss der Technischen Universit¨at Hamburg-Harburg zur Erlangung des akademischen Grades Doktor der Wirtschafts- und Sozialwissenschaften (Dr. rer. pol.) genehmigte Dissertation von Giulio Barth aus M¨unster 2018 Advisors: Prof. Dr. C. Ihl, Prof. Dr. M. G. M¨ohrle Institute of Entrepreneurship, TUHH i Gutachter: Prof. Dr. C. Ihl Prof. Dr. M. G. Mohrle¨ Vorsitz: Prof. Dr. C. Luthje¨ Tag der mundlichen¨ Prufung:¨ 14. September 2018 ”Our victory: inevitable; our timing: uncertain.” (Drew Endy, Assistant Professor Stanford University) i Abstract Scientific innovations need to widely diffuse to fully exploit their potential. Prior research investigated levers on the diffusion of scientific innovation with particular interest on institutions, e.g., settings of property rights. As institutional theory lacks in explaining emergence and shaping of institu- tions, the institutional entrepreneur approach faces these limitations. Key actors combine logics from multiple fields and convince their social context of their ideas to legitimate the creation of new institutions and shape an emerging field. This thesis validates theories on institutional entrepreneurs and investigates the end-to process from diffusing a logic to the impact of an established insti- tution on scientific innovations in context of the emerging synthetic biology. The field is expected to introduce the 5th revolution and characterized by the central logic of making biology an engineering discipline. In chapter 4 theories on institutional entrepreneurs driving diffusion of in- stitutional logics to shape an emerging field are validated. To measure the social influence mechanisms, the heterogeneous diffusion model is adapted to the institutional logic. -
CBD/DSI/AHTEG/2018/1/3 12 January 2018
CBD Distr. GENERAL CBD/SBSTTA/22/INF/3 CBD/DSI/AHTEG/2018/1/3 12 January 2018 ENGLISH ONLY AD HOC TECHNICAL EXPERT GROUP ON SUBSIDIARY BODY ON SCIENTIFIC, DIGITAL SEQUENCE INFORMATION ON TECHNICAL AND TECHNOLOGICAL GENETIC RESOURCES ADVICE Montreal, Canada, 13-16 February 2018 Twenty-second meeting Item 3 of the provisional agenda** Montreal, Canada, 2-7 July 2018 Item 3 of the provisional agenda*** FACT-FINDING AND SCOPING STUDY ON DIGITAL SEQUENCE INFORMATION ON GENETIC RESOURCES IN THE CONTEXT OF THE CONVENTION ON BIOLOGICAL DIVERSITY AND THE NAGOYA PROTOCOL Note by the Executive Secretary 1. In decision XIII/16, paragraph 3(b), the Executive Secretary was requested to commission a fact-finding and scoping study, subject to the availability of funds, to clarify terminology and concepts and to assess the extent and the terms and conditions of the use of digital sequence information on genetic resources in the context of the Convention and the Nagoya Protocol. 2. Accordingly, the Executive Secretary commissioned a research team led by Ms. Sarah Laird of People and Plants International and Ms. Rachel Wynberg of the University of Cape Town, to carry out this study. The study was undertaken with the generous financial support of Canada, the European Union and Switzerland. 3. A draft of the study was made available online for peer review from 8 November to 1 December 2017. 1 The comments received in response have been made available online.2 The research team revised the study in the light of the comments received and the final version is presented below in the form and language in which it was received by the Secretariat of the Convention on Biological Diversity. -
A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems
A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems Benyamin Y. Y. Aziz, M.Sc. School of Computing, Dublin City University A thesis presented in fulfillment of the requirements for the degree of Doctor of Philosophy Supervisor: Dr Geoff Hamilton September 2003 “Start by doing what’s necessary; then do what’s possible; and suddenly you are doing the impossible” St. Francis of Assisi To Yowell, Olivia and Clotilde Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of the degree of Doctor of Philosophy (Ph.D.) is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: I.D. No.: Date: Acknowledgements I would like to thank all those people who were true sources of inspiration, knowledge, guidance and help to myself throughout the period of my doctoral research. In particular, I would like to thank my supervisor, Dr. Geoff Hamilton, without whom this work would not have seen the light. I would also like to thank Dr. David Gray, with whom I had many informative conversations, and my colleagues, Thomas Hack and Fr´ed´ericOehl, for their advice and guidance. Finally, I would like to mention that the work of this thesis was partially funded by project IMPROVE (Enterprise Ireland Strategic Grant ST/2000/94). Benyamin Aziz Abstract We introduce a static analysis framework for detecting instances of security breaches in infinite mobile and cryptographic systems specified using the languages of the π-calculus and its cryptographic extension, the spi calculus. -
“Scrap Your Boilerplate” Reloaded
“Scrap Your Boilerplate” Reloaded Ralf Hinze1, Andres L¨oh1, and Bruno C. d. S. Oliveira2 1 Institut f¨urInformatik III, Universit¨atBonn R¨omerstraße164, 53117 Bonn, Germany {ralf,loeh}@informatik.uni-bonn.de 2 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford OX1 3QD, UK [email protected] Abstract. The paper “Scrap your boilerplate” (SYB) introduces a com- binator library for generic programming that offers generic traversals and queries. Classically, support for generic programming consists of two es- sential ingredients: a way to write (type-)overloaded functions, and in- dependently, a way to access the structure of data types. SYB seems to lack the second. As a consequence, it is difficult to compare with other approaches such as PolyP or Generic Haskell. In this paper we reveal the structural view that SYB builds upon. This allows us to define the combinators as generic functions in the classical sense. We explain the SYB approach in this changed setting from ground up, and use the un- derstanding gained to relate it to other generic programming approaches. Furthermore, we show that the SYB view is applicable to a very large class of data types, including generalized algebraic data types. 1 Introduction The paper “Scrap your boilerplate” (SYB) [1] introduces a combinator library for generic programming that offers generic traversals and queries. Classically, support for generic programming consists of two essential ingredients: a way to write (type-)overloaded functions, and independently, a way to access the structure of data types. SYB seems to lacks the second, because it is entirely based on combinators. -
Manydsl One Host for All Language Needs
ManyDSL One Host for All Language Needs Piotr Danilewski March 2017 A dissertation submitted towards the degree (Dr.-Ing.) of the Faculty of Mathematics and Computer Science of Saarland University. Saarbrücken Dean Prof. Dr. Frank-Olaf Schreyer Date of Colloquium June 6, 2017 Examination Board: Chairman Prof. Dr. Sebastian Hack Reviewers Prof. Dr.-Ing. Philipp Slusallek Prof. Dr. Wilhelm Reinhard Scientific Asistant Dr. Tim Dahmen Piotr Danilewski, [email protected] Saarbrücken, June 6, 2017 Statement I hereby declare that this dissertation is my own original work except where otherwise indicated. All data or concepts drawn directly or indirectly from other sources have been correctly acknowledged. This dissertation has not been submitted in its present or similar form to any other academic institution either in Germany or abroad for the award of any degree. Saarbrücken, June 6, 2017 (Piotr Danilewski) Declaration of Consent Herewith I agree that my thesis will be made available through the library of the Computer Science Department. Saarbrücken, June 6, 2017 (Piotr Danilewski) Zusammenfassung Die Sprachen prägen die Denkweise. Das ist die Tatsache für die gesprochenen Sprachen aber auch für die Programmiersprachen. Da die Computer immer wichtiger in jedem Aspekt des menschlichen Lebens sind, steigt der Bedarf um entsprechend neue Konzepte in den Programmiersprachen auszudrücken. Jedoch, damit unsere Denkweise sich weiterentwicklen könnte, müssen sich auch die Programmiersprachen weiterentwickeln. Aber welche Hilfsmittel gibt es um die Programmiersprachen zu schaffen und aufzurüsten? Wie kann man Entwickler ermutigen damit sie eigene Sprachen definieren, die dem Bereich in dem sie arbeiten am besten passen? Heutzutage gibt es zwei Methoden. -
Static Analyses for Stratego Programs
Static analyses for Stratego programs BSc project report June 30, 2011 Author name Vlad A. Vergu Author student number 1195549 Faculty Technical Informatics - ST track Company Delft Technical University Department Software Engineering Commission Ir. Bernard Sodoyer Dr. Eelco Visser 2 I Preface For the successful completion of their Bachelor of Science, students at the faculty of Computer Science of the Technical University of Delft are required to carry out a software engineering project. The present report is the conclusion of this Bachelor of Science project for the student Vlad A. Vergu. The project has been carried out within the Software Language Design and Engineering Group of the Computer Science faculty, under the direct supervision of Dr. Eelco Visser of the aforementioned department and Ir. Bernard Sodoyer. I would like to thank Dr. Eelco Visser for his past and ongoing involvment and support in my educational process and in particular for the many opportunities for interesting and challenging projects. I further want to thank Ir. Bernard Sodoyer for his support with this project and his patience with my sometimes unconvential way of working. Vlad Vergu Delft; June 30, 2011 II Summary Model driven software development is gaining momentum in the software engi- neering world. One approach to model driven software development is the design and development of domain-specific languages allowing programmers and users to spend more time on their core business and less on addressing non problem- specific issues. Language workbenches and support languages and compilers are necessary for supporting development of these domain-specific languages. One such workbench is the Spoofax Language Workbench. -
On Specifying and Visualising Long-Running Empirical Studies
On Specifying and Visualising Long-Running Empirical Studies Peter Y. H. Wong and Jeremy Gibbons Computing Laboratory, University of Oxford, United Kingdom fpeter.wong,[email protected] Abstract. We describe a graphical approach to formally specifying tem- porally ordered activity routines designed for calendar scheduling. We introduce a workflow model OWorkflow, for constructing specifications of long running empirical studies such as clinical trials in which obser- vations for gathering data are performed at strict specific times. These observations, either manually performed or automated, are often inter- leaved with scientific procedures, and their descriptions are recorded in a calendar for scheduling and monitoring to ensure each observation is carried out correctly at a specific time. We also describe a bidirectional transformation between OWorkflow and a subset of Business Process Modelling Notation (BPMN), by which graphical specification, simula- tion, automation and formalisation are made possible. 1 Introduction A typical long-running empirical study consists of a series of scientific proce- dures interleaved with a set of observations performed over a period of time; these observations may be manually performed or automated, and are usually recorded in a calendar schedule. An example of a long-running empirical study is a clinical trial, where observations, specifically case report form submissions, are performed at specific points in the trial. In such examples, observations are interleaved with clinical interventions on patients; precise descriptions of these observations are then recorded in a patient study calendar similar to the one shown in Figure 1(a). Currently study planners such as trial designers supply information about observations either textually or by inputting textual infor- mation and selecting options on XML-based data entry forms [2], similar to the one shown in Figure 1(b). -
Lecture Notes in Computer Science 6120 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
Lecture Notes in Computer Science 6120 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany Claude Bolduc Jules Desharnais Béchir Ktari (Eds.) Mathematics of Program Construction 10th International Conference, MPC 2010 Québec City, Canada, June 21-23, 2010 Proceedings 13 Volume Editors Claude Bolduc Jules Desharnais Béchir Ktari Université Laval, Département d’informatique et de génie logiciel Pavillon Adrien-Pouliot, 1065 Avenue de la Médecine Québec, QC, G1V 0A6, Canada E-mail: {Claude.Bolduc, Jules.Desharnais, Bechir.Ktari}@ift.ulaval.ca Library of Congress Control Number: 2010927075 CR Subject Classification (1998): F.3, D.2, F.4.1, D.3, D.2.4, D.1 LNCS Sublibrary: SL 1 – Theoretical Computer Science and General Issues ISSN 0302-9743 ISBN-10 3-642-13320-7 Springer Berlin Heidelberg New York ISBN-13 978-3-642-13320-6 Springer Berlin Heidelberg New York This work is subject to copyright. -
A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems
A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems Benyamin Y. Y. Aziz, M.Sc. School of Computing, Dublin City University A thesis presented in fulfillment of the requirements for the degree of Doctor of Philosophy Supervisor: Dr Geoff Hamilton September 2003 “Start by doing what’s necessary; then do what’s possible; and suddenly you are doing the impossible” St. Francis of Assisi To Yowell, Olivia and Clotilde Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of the degree of Doctor of Philosophy (Ph.D.) is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: I.D. No.: Date: Acknowledgements I would like to thank all those people who were true sources of inspiration, knowledge, guidance and help to myself throughout the period of my doctoral research. In particular, I would like to thank my supervisor, Dr. Geoff Hamilton, without whom this work would not have seen the light. I would also like to thank Dr. David Gray, with whom I had many informative conversations, and my colleagues, Thomas Hack and Fr´ed´ericOehl, for their advice and guidance. Finally, I would like to mention that the work of this thesis was partially funded by project IMPROVE (Enterprise Ireland Strategic Grant ST/2000/94). Benyamin Aziz Abstract We introduce a static analysis framework for detecting instances of security breaches in infinite mobile and cryptographic systems specified using the languages of the π-calculus and its cryptographic extension, the spi calculus. -
Domain-Specific Languages for Modeling and Simulation
Domain-specifc Languages for Modeling and Simulation Dissertation zur Erlangung des akademischen Grades Doktor-Ingenieur (Dr.-Ing.) der Fakultät für Informatik und Elektrotechnik der Universität Rostock vorgelegt von Tom Warnke, geb. am 25.01.1988 in Malchin aus Rostock Rostock, 14. September 2020 https://doi.org/10.18453/rosdok_id00002966 Dieses Werk ist lizenziert unter einer Creative Commons Namensnennung - Weitergabe unter gleichen Bedingungen 4.0 International Lizenz. Gutachter: Prof. Dr. Adelinde M. Uhrmacher (Universität Rostock) Prof. Rocco De Nicola (IMT Lucca) Prof. Hans Vangheluwe (Universität Antwerpen) Eingereicht am 14. September 2020 Verteidigt am 8. Januar 2021 Abstract Simulation models and simulation experiments are increasingly complex. One way to handle this complexity is developing software languages tailored to specifc application domains, so-called domain-specifc languages (DSLs). This thesis explores the potential of employing DSLs in modeling and simulation. We study diferent DSL design and implementation techniques and illustrate their benefts for expressing simulation models as well as simulation experiments with several examples. Regarding simulation models, we focus on discrete-event models based on continuous- time Markov chains (CTMCs). Most of our work revolves around ML-Rules, an rule-based modeling language for biochemical reaction networks. First, we relate the expressive power of ML-Rules to other currently available modeling languages for this application domain. Then we defne the abstract syntax and operational semantics for ML-Rules, mapping models to CTMCs in an unambiguous and precise way. Based on the formal defnitions, we present two approaches to implement ML-Rules as a DSL. The core of both implementations is fnding the matches for the patterns on the left side of ML-Rules’ rules.