text
stringlengths 29
3.76k
| label
stringclasses 8
values |
|---|---|
The template-based method is one of the most successful approaches to
algebraic invariant synthesis. In this method, an algorithm designates a
template polynomial p over program variables, generates constraints for p=0 to
be an invariant, and solves the generated constraints. However, this approach
often suffers from an increasing template size if the degree of a template
polynomial is too high.
We propose a technique to make template-based methods more efficient. Our
technique is based on the following finding: If an algebraic invariant exists,
then there is a specific algebraic invariant that we call a generalized
homogeneous algebraic invariant that is often smaller. This finding justifies
using only a smaller template that corresponds to a generalized homogeneous
algebraic invariant.
Concretely, we state our finding above formally based on the abstract
semantics of an imperative program proposed by Cachera et al. Then, we modify
their template-based invariant synthesis so that it generates only generalized
homogeneous algebraic invariants. This modification is proved to be sound.
Furthermore, we also empirically demonstrate the merit of the restriction to
generalized homogeneous algebraic invariants. Our implementation outperforms
that of Cachera et al. for programs that require a higher-degree template.
|
cs.*
|
We present a framework for C code in C11 syntax deeply integrated into the
Isabelle/PIDE development environment. Our framework provides an abstract
interface for verification back-ends to be plugged-in independently. Thus,
various techniques such as deductive program verification or white-box testing
can be applied to the same source, which is part of an integrated PIDE document
model. Semantic back-ends are free to choose the supported C fragment and its
semantics. In particular, they can differ on the chosen memory model or the
specification mechanism for framing conditions.
Our framework supports semantic annotations of C sources in the form of
comments. Annotations serve to locally control back-end settings, and can
express the term focus to which an annotation refers. Both the logical and the
syntactic context are available when semantic annotations are evaluated. As a
consequence, a formula in an annotation can refer both to HOL or C variables.
Our approach demonstrates the degree of maturity and expressive power the
Isabelle/PIDE subsystem has achieved in recent years. Our integration technique
employs Lex and Yacc style grammars to ensure efficient deterministic parsing.
We present two case studies for the integration of (known) semantic back-ends
in order to validate the design decisions for our back-end interface.
|
cs.*
|
These proceedings include selected papers presented at the 9th Workshop on
Horn Clauses for Verification and Synthesis and the Tenth International
Workshop on Verification and Program Transformation, both affiliated with ETAPS
2022.
Many Program Verification and Synthesis problems of interest can be modeled
directly using Horn clauses and many recent advances in the CLP and CAV
communities have centered around efficiently solving problems presented as Horn
clauses.
The HCVS series of workshops aims to bring together researchers working in
the communities of Constraint/Logic Programming (e.g., ICLP and CP), Program
Verification (e.g., CAV, TACAS, and VMCAI), and Automated Deduction (e.g.,
CADE, IJCAR), on the topic of Horn clause based analysis, verification, and
synthesis.
Horn clauses for verification and synthesis have been advocated by these
communities in different times and from different perspectives and HCVS is
organized to stimulate interaction and a fruitful exchange and integration of
experiences.
The aim of the VPT workshop is to bring together researchers working in the
fields of Program Verification and Program Transformation.
There is a great potential for beneficial interactions between these two
fields because:
1) On one hand, methods and tools developed in the field of Program
Transformation such as partial evaluation, fold/unfold transformations, and
supercompilation, have all been applied with success for the verification of
infinite state and parameterized systems.
2) On the other hand, model checking, abstract interpretation, SAT and SMT
solving and automated theorem proving have been used to enhance program
transformation techniques. Moreover, the formal certification of program
transformation tools, such as automated refactoring tools and compilers, has
recently attracted considerable interest, posed major challenges.
|
cs.*
|
This volume contains
* The post-proceedings of the Eighteenth Logical and Semantic Frameworks with
Applications (LSFA 2023). The meeting was held on July 1-2, 2023, organised by
the Sapienza Universit\`a di Roma, Italy. LSFA aims to bring researchers and
students interested in theoretical and practical aspects of logical and
semantic frameworks and their applications. The covered topics include proof
theory, type theory and rewriting theory, specification and deduction
languages, and formal semantics of languages and systems.
* The post-proceedings of the Tenth Workshop on Horn clauses for Verification
and Synthesis (HCVS 2023). The meeting was held on April 23, 2023 at the
Institut Henri Poincar\'e in Paris. HCVS aims to bring together researchers
working in the two communities of constraint/ logic programming (e.g., ICLP and
CP), program verification (e.g., CAV, TACAS, and VMCAI), and automated
deduction (e.g., CADE, IJCAR), on the topics of Horn clause based analysis,
verification, and synthesis.
|
cs.*
|
We introduce DRAGON, an open-source, fast and explainable hardware simulation
and optimization toolchain that enables hardware architects to simulate
hardware designs, and to optimize hardware designs to efficiently execute
workloads.
The DRAGON toolchain provides the following tools: Hardware Model Generator
(DGen), Hardware Simulator (DSim) and Hardware Optimizer (DOpt).
DSim provides the simulation of running algorithms (represented as data-flow
graphs) on hardware described. DGen describes the hardware in detail, with user
input architectures/technology (represented in a custom description language).
A novel methodology of gradient descent from the simulation allows us optimize
the hardware model (giving the directions for improvements in technology
parameters and design parameters), provided by Dopt.
DRAGON framework (DSim) is much faster than previously avaible works for
simulation, which is possible through performance-first code writing practices,
mathematical formulas for common computing operations to avoid cycle-accurate
simulation steps, efficient algorithms for mapping, and data-structure
representations for hardware state. DRAGON framework (Dopt) generates
performance optimized architectures for both AI and Non-AI Workloads, and
provides technology improvement directions for 100x-1000x better future
computing systems.
|
cs.*
|
The recent advances in machine learning, in general, and Artificial Neural
Networks (ANN), in particular, has made smart embedded systems an attractive
option for a larger number of application areas. However, the high
computational complexity, memory footprints, and energy requirements of machine
learning models hinder their deployment on resource-constrained embedded
systems. Most state-of-the-art works have considered this problem by proposing
various low bit-width data representation schemes, optimized arithmetic
operators' implementations, and different complexity reduction techniques such
as network pruning. To further elevate the implementation gains offered by
these individual techniques, there is a need to cross-examine and combine these
techniques' unique features. This paper presents ExPAN(N)D, a framework to
analyze and ingather the efficacy of the Posit number representation scheme and
the efficiency of fixed-point arithmetic implementations for ANNs. The Posit
scheme offers a better dynamic range and higher precision for various
applications than IEEE $754$ single-precision floating-point format. However,
due to the dynamic nature of the various fields of the Posit scheme, the
corresponding arithmetic circuits have higher critical path delay and resource
requirements than the single-precision-based arithmetic units. Towards this
end, we propose a novel Posit to fixed-point converter for enabling
high-performance and energy-efficient hardware implementations for ANNs with
minimal drop in the output accuracy. We also propose a modified Posit-based
representation to store the trained parameters of a network. Compared to an
$8$-bit fixed-point-based inference accelerator, our proposed implementation
offers $\approx46\%$ and $\approx18\%$ reductions in the storage requirements
of the parameters and energy consumption of the MAC units, respectively.
|
cs.*
|
Proceedings of the 2022 Workshop on Resource AWareness of Systems and Society
(RAW), colocated with ICT4S 2022 in Plovdiv, Bulgaria on 13th of June 2022.
|
cs.*
|
In this short article, we look at an old logical puzzle, its solution and
proof and discuss some interesting aspects concerning its representation in a
logic programming language like Prolog. We also discuss an intriguing
information theoretic aspect of the puzzle.
|
cs.*
|
The influence of Alfred Tarski on computer science was indirect but
significant in a number of directions and was in certain respects fundamental.
Here surveyed is the work of Tarski on the decision procedure for algebra and
geometry, the method of elimination of quantifiers, the semantics of formal
languages, modeltheoretic preservation theorems, and algebraic logic; various
connections of each with computer science are taken up.
|
cs.*
|
In this paper, we analyze axiomatic issues of unconventional computations
from a methodological and philosophical point of view. We explain how the new
models of algorithms changed the algorithmic universe, making it open and
allowing increased flexibility and creativity. However, the greater power of
new types of algorithms also brought the greater complexity of the algorithmic
universe, demanding new tools for its study. That is why we analyze new
powerful tools brought forth by the axiomatic theory of algorithms, automata
and computation.
|
cs.*
|
General Matrix Multiplication (GEMM) is a fundamental operation widely used
in scientific computations. Its performance and accuracy significantly impact
the performance and accuracy of applications that depend on it. One such
application is semidefinite programming (SDP), and it often requires binary128
or higher precision arithmetic to solve problems involving SDP stably. However,
only some processors support binary128 arithmetic, which makes SDP solvers
generally slow. In this study, we focused on accelerating GEMM with binary128
arithmetic on field-programmable gate arrays (FPGAs) to enable the flexible
design of accelerators for the desired computations. Our binary128 GEMM designs
on a recent high-performance FPGA achieved approximately 90GFlops, 147x faster
than the computation executed on a recent CPU with 20 threads for large
matrices. Using our binary128 GEMM design on the FPGA, we successfully
accelerated two numerical applications: LU decomposition and SDP problems, for
the first time.
|
cs.*
|
Long range detection is a cornerstone of defense in many operating domains
(land, sea, undersea, air, space, ..,). In the cyber domain, long range
detection requires the analysis of significant network traffic from a variety
of observatories and outposts. Construction of anonymized hypersparse traffic
matrices on edge network devices can be a key enabler by providing significant
data compression in a rapidly analyzable format that protects privacy.
GraphBLAS is ideally suited for both constructing and analyzing anonymized
hypersparse traffic matrices. The performance of GraphBLAS on an Accolade
Technologies edge network device is demonstrated on a near worse case traffic
scenario using a continuous stream of CAIDA Telescope darknet packets. The
performance for varying numbers of traffic buffers, threads, and processor
cores is explored. Anonymized hypersparse traffic matrices can be constructed
at a rate of over 50,000,000 packets per second; exceeding a typical 400
Gigabit network link. This performance demonstrates that anonymized hypersparse
traffic matrices are readily computable on edge network devices with minimal
compute resources and can be a viable data product for such devices.
|
cs.*
|
We study life over the course of video game history as represented by their
mechanics. While there have been some variations depending on genre or
"character type", we find that most games converge to a similar representation.
We also examine the development of Conway's Game of Life (one of the first zero
player games) and related automata that have developed over the years. With
this history in mind, we investigate the viability of one popular form of
automata, namely Neural Cellular Automata, as a way to more fully express life
within video game settings and innovate new game mechanics or gameplay loops.
|
cs.*
|
The ontological and epistemological positions adopted by information systems
design methods are incommensur-able when pushed to their extremes. Information
systems research has therefore tended to focus on the similarities between
different positions, usually in search of a single, unifying position. However,
by focusing on the similari-ties, the clarity of argument provided by any one
philoso-phical position is necessarily diminished. Consequently, researchers
often treat the philosophical foundations of design methods as being of only
minor importance. In this paper, we have deliberately chosen to focus on the
differences between various philosophical positions. From this focus, we
believe we can offer a clearer under-standing of the empirical behaviour of
software as viewed from particular philosophical positions. Since the
em-pirical evidence does not favour any single position, we conclude by arguing
for the validity of ad hoc approaches to software design which we believe
provides a stronger and more theoretically grounded approach to software
design.
|
cs.*
|
Although the gulf between the theory and practice in Information Systems is
much lamented, few researchers have offered a way forward except through a
number of (failed) attempts to develop a single systematic theory for
Information Systems. In this paper, we encourage researchers to re-examine the
practical consequences of their theoretical arguments. By examining these
arguments we may be able to form a number of more rigorous theories of
Information Systems, allowing us to draw theory and practice together without
undertaking yet another attempt at the holy grail of a single unified
systematic theory of Information Systems.
|
cs.*
|
Sourcing processes are discussed at a high abstraction level. A dedicated
terminology is developed concerning general aspects of sourcing. The term
sourcement is coined to denote a building block for sourcing. No- tions of
allocation, functional architecture and allocational architecture, equilibrium,
and configuration are discussed. Limitations of the concept of outsourcing are
outlined. This theoretical work is meant to serve as a point of departure for
the subsequent development of a detailed theory of sourcing and sourcing
transformations, which can be a tool for dealing with practical applica- tions.
|
cs.*
|
Sustainability is a central concern for our society, and software systems
increasingly play a central role in it. As designers of software technology, we
cause change and are responsible for the effects of our design choices. We
recognize that there is a rapidly increasing awareness of the fundamental need
and desire for a more sustainable world, and there is a lot of genuine
goodwill. However, this alone will be ineffective unless we come to understand
and address our persistent misperceptions. The Karlskrona Manifesto for
Sustainability Design aims to initiate a much needed conversation in and beyond
the software community by highlighting such perceptions and proposing a set of
fundamental principles for sustainability design.
|
cs.*
|
Michael Gordon was a pioneer in the field of interactive theorem proving and
hardware verification. In the 1970s, he had the vision of formally verifying
system designs, proving their correctness using mathematics and logic. He
demonstrated his ideas on real-world computer designs. His students extended
the work to such diverse areas as the verification of floating-point
algorithms, the verification of probabilistic algorithms and the verified
translation of source code to correct machine code. He was elected to the Royal
Society in 1994, and he continued to produce outstanding research until
retirement.
His achievements include his work at Edinburgh University helping to create
Edinburgh LCF, the first interactive theorem prover of its kind, and the ML
family of functional programming languages. He adopted higher-order logic as a
general formalism for verification, showing that it could specify hardware
designs from the gate level right up to the processor level. It turned out to
be an ideal formalism for many problems in computer science and mathematics.
His tools and techniques have exerted a huge influence across the field of
formal verification.
|
cs.*
|
Scientific software projects evolve rapidly in their initial development
phase, yet at the end of a funding period, the completion of a research
project, thesis, or publication, further engagement in the project may slow
down or cease completely. To retain the invested effort for the sciences, this
software needs to be preserved or handed over to a succeeding developer or
team, such as the next generation of (PhD) students.
Comparable guides provide top-down recommendations for project leads. This
paper intends to be a bottom-up approach for sustainable hand-over processes
from a developer's perspective. An important characteristic in this regard is
the project's size, by which this guideline is structured. Furthermore,
checklists are provided, which can serve as a practical guide for implementing
the proposed measures.
|
cs.*
|
Research software has become a central asset in academic research. It
optimizes existing and enables new research methods, implements and embeds
research knowledge, and constitutes an essential research product in itself.
Research software must be sustainable in order to understand, replicate,
reproduce, and build upon existing research or conduct new research
effectively. In other words, software must be available, discoverable, usable,
and adaptable to new needs, both now and in the future. Research software
therefore requires an environment that supports sustainability. Hence, a change
is needed in the way research software development and maintenance are
currently motivated, incentivized, funded, structurally and infrastructurally
supported, and legally treated. Failing to do so will threaten the quality and
validity of research. In this paper, we identify challenges for research
software sustainability in Germany and beyond, in terms of motivation,
selection, research software engineering personnel, funding, infrastructure,
and legal aspects. Besides researchers, we specifically address political and
academic decision-makers to increase awareness of the importance and needs of
sustainable research software practices. In particular, we recommend strategies
and measures to create an environment for sustainable research software, with
the ultimate goal to ensure that software-driven research is valid,
reproducible and sustainable, and that software is recognized as a first class
citizen in research. This paper is the outcome of two workshops run in Germany
in 2019, at deRSE19 - the first International Conference of Research Software
Engineers in Germany - and a dedicated DFG-supported follow-up workshop in
Berlin.
|
cs.*
|
Empirical Standards are natural-language models of a scientific community's
expectations for a specific kind of study (e.g. a questionnaire survey). The
ACM SIGSOFT Paper and Peer Review Quality Initiative generated empirical
standards for research methods commonly used in software engineering. These
living documents, which should be continuously revised to reflect evolving
consensus around research best practices, will improve research quality and
make peer review more effective, reliable, transparent and fair.
|
cs.*
|
In the era of revolution, the development of softwares are increasing daily.
The quality of software impacts the most in software development. To ensure the
quality of the software it needs to be reviewed and updated. The effectiveness
of the code review is that it ensures the quality of software and makes it
updated. Code review is the best process that helps the developers to develop a
system errorless. This report contains two different code review papers to be
evaluated and find the influences that can affect the code reviewing process.
The reader can easily understand the factor of the code review process which is
directly associated with software quality assurance.
|
cs.*
|
As businesses get more sizable and more mature they now, inevitably accrete
more and more software systems. This estate expansion leads not only to greater
complexity and expense for the enterprise, but also to fragmentation,
inconsistency and siloing of business processes. Because platform
rationalisation and system decommissioning never happens spontaneously, a
perennial problem for the enterprise then becomes how to simplify their
corporate software platforms. Recently, Curlew Research personnel were involved
in a software rationalisation program within a large global life sciences
company and this paper describes an approach to decommissioning which we
developed as part of that project, and which we feel could be of use more
widely to help with objective more user-centric system rationalisation. The
method derives from a model developed by Noriaki Kano et al to help with
determining customer satisfaction and loyalty, and the prioritisation of new,
additional functionality, features or "products", for example when looking to
enhance software applications. Using a blueprint process for rationalisation,
the Curlew-Kano method enables each application to be placed efficiently and
objectively into one of four categories - Retain; Review; Remove; Research -
thus allowing the enterprise to identify and prioritise quickly those systems
which warrant further investigation as part of a decommissioning activity. The
key difference of the Curlew-Kano method compared to other application
rationalisation methodologies is the fundamental involvement of users in the
identification of systems more suitable for rationalisation and possible
decommissioning. In our view involving users more fully in system
rationalisation leads to better outcomes for the enterprise.
|
cs.*
|
It is essential to discuss the role, difficulties, and opportunities
concerning people of different gender in the field of software engineering
research, education, and industry. Although some literature reviews address
software engineering and gender, it is still unclear how research and practices
in Asia exist for handling gender aspects in software development and
engineering. We conducted a systematic literature review to grasp the
comprehensive view of gender research and practices in Asia. We analyzed the 32
identified papers concerning countries and publication years among 463
publications. Researchers and practitioners from various organizations actively
work on gender research and practices in some countries, including China,
India, and Turkey. We identified topics and classified them into seven
categories varying from personal mental health and team building to
organization. Future research directions include investigating the synergy
between (regional) gender aspects and cultural concerns and considering
possible contributions and dependency among different topics to have a solid
foundation for accelerating further research and getting actionable practices.
|
cs.*
|
Green software engineering aims at reducing the environmental impact due to
developing, deploying, and managing software systems. Meanwhile, Cloud-IoT
paradigms can contribute to improving energy and carbon efficiency of
application deployments by (i) reducing the amount of data and the distance
they must travel across the network, (ii) by exploiting idle edge devices to
support application deployment. In this article, we propose a declarative
methodology and its Prolog prototype for determining placements of application
services onto Cloud-IoT infrastructures so to optimise energy and carbon
efficiency, also considering different infrastructure power sources and
operational costs. The proposal is assessed over a motivating example.
|
cs.*
|
Spectre attacks exploit speculative execution to leak sensitive information.
In the last few years, a number of static side-channel detectors have been
proposed to detect cache leakage in the presence of speculative execution.
However, these techniques either ignore branch prediction mechanism, detect
static pre-defined patterns which is not suitable for detecting new patterns,
or lead to false negatives.
In this paper, we illustrate the weakness of prediction-agnostic
state-of-the-art approaches. We propose Specognitor, a novel prediction-aware
symbolic execution engine to soundly explore program paths and detect subtle
spectre variant 1 and variant 2 vulnerabilities. We propose a dynamic pattern
detection mechanism to account for both existing and future vulnerabilities.
Our experimental results show the effectiveness and efficiency of Specognitor
in analyzing real-world cryptographic programs w.r.t. different processor
families.
|
cs.*
|
We introduce the idea of Data Readiness Level (DRL) to measure the relative
richness of data to answer specific questions often encountered by data
scientists. We first approach the problem in its full generality explaining its
desired mathematical properties and applications and then we propose and study
two DRL metrics. Specifically, we define DRL as a function of at least four
properties of data: Noisiness, Believability, Relevance, and Coherence. The
information-theoretic based metrics, Cosine Similarity and Document Disparity,
are proposed as indicators of Relevance and Coherence for a piece of data. The
proposed metrics are validated through a text-based experiment using Twitter
data.
|
cs.*
|
The need for modern data analytics to combine relational, procedural, and
map-reduce-style functional processing is widely recognized. State-of-the-art
systems like Spark have added SQL front-ends and relational query optimization,
which promise an increase in expressiveness and performance. But how good are
these extensions at extracting high performance from modern hardware platforms?
While Spark has made impressive progress, we show that for relational
workloads, there is still a significant gap compared with best-of-breed query
engines. And when stepping outside of the relational world, query optimization
techniques are ineffective if large parts of a computation have to be treated
as user-defined functions (UDFs).
We present Flare: a new back-end for Spark that brings performance closer to
the best SQL engines, without giving up the added expressiveness of Spark. We
demonstrate order of magnitude speedups both for relational workloads such as
TPC-H, as well as for a range of machine learning kernels that combine
relational and iterative functional processing.
Flare achieves these results through (1) compilation to native code, (2)
replacing parts of the Spark runtime system, and (3) extending the scope of
optimization and code generation to large classes of UDFs.
|
cs.*
|
MiniConf is a framework for hosting virtual academic conferences motivated by
the sudden inability for these events to be hosted globally. The framework is
designed to be global and asynchronous, interactive, and to promote browsing
and discovery. We developed the system to be sustainable and maintainable, in
particular ensuring that it is open-source, easy to setup, and scalable on
minimal hardware. In this technical report, we discuss design decisions,
provide technical detail, and show examples of a case study deployment.
|
cs.*
|
In this unhinged rant, I lay out my suspicion that a lot of visualizations
are bullshit: charts that do not have even the common decency to intentionally
lie but are totally unconcerned about the state of the world or any practical
utility. I suspect that bullshit charts take up a large fraction of the time
and attention of actual visualization producers and consumers, and yet are
seemingly absent from academic research into visualization design.
|
cs.*
|
Understanding the landscape of potential harms from algorithmic systems
enables practitioners to better anticipate consequences of the systems they
build. It also supports the prospect of incorporating controls to help minimize
harms that emerge from the interplay of technologies and social and cultural
dynamics. A growing body of scholarship has identified a wide range of harms
across different algorithmic technologies. However, computing research and
practitioners lack a high level and synthesized overview of harms from
algorithmic systems. Based on a scoping review of computing research $(n=172)$,
we present an applied taxonomy of sociotechnical harms to support a more
systematic surfacing of potential harms in algorithmic systems. The final
taxonomy builds on and refers to existing taxonomies, classifications, and
terminologies. Five major themes related to sociotechnical harms -
representational, allocative, quality-of-service, interpersonal harms, and
social system/societal harms - and sub-themes are presented along with a
description of these categories. We conclude with a discussion of challenges
and opportunities for future research.
|
cs.*
|
The Web community has introduced a set of standards and technologies for
representing, querying, and manipulating a globally distributed data structure
known as the Web of Data. The proponents of the Web of Data envision much of
the world's data being interrelated and openly accessible to the general
public. This vision is analogous in many ways to the Web of Documents of common
knowledge, but instead of making documents and media openly accessible, the
focus is on making data openly accessible. In providing data for public use,
there has been a stimulated interest in a movement dubbed Open Data. Open Data
is analogous in many ways to the Open Source movement. However, instead of
focusing on software, Open Data is focused on the legal and licensing issues
around publicly exposed data. Together, various technological and legal tools
are laying the groundwork for the future of global-scale data management on the
Web. As of today, in its early form, the Web of Data hosts a variety of data
sets that include encyclopedic facts, drug and protein data, metadata on music,
books and scholarly articles, social network representations, geospatial
information, and many other types of information. The size and diversity of the
Web of Data is a demonstration of the flexibility of the underlying standards
and the overall feasibility of the project as a whole. The purpose of this
article is to provide a review of the technological underpinnings of the Web of
Data as well as some of the hurdles that need to be overcome if the Web of Data
is to emerge as the defacto medium for data representation, distribution, and
ultimately, processing.
|
cs.*
|
Stream computation is one of the approaches suitable for FPGA-based custom
computing due to its high throughput capability brought by pipelining with
regular memory access. To increase performance of iterative stream computation,
we can exploit both temporal and spatial parallelism by deepening and
duplicating pipelines, respectively. However, the performance is constrained by
several factors including available hardware resources on FPGA, an external
memory bandwidth, and utilization of pipeline stages, and therefore we need to
find the best mix of the different parallelism to achieve the highest
performance per power. In this paper, we present a domain-specific language
(DSL) based design space exploration for temporally and/or spatially parallel
stream computation with FPGA. We define a DSL where we can easily design a
hierarchical structure of parallel stream computation with abstract description
of computation. For iterative stream computation of fluid dynamics simulation,
we design hardware structures with a different mix of the temporal and spatial
parallelism. By measuring the performance and the power consumption, we find
the best among them.
|
cs.*
|
Currently, there is no universal method to track who shared what, with whom,
when and for what purposes in a verifiable way to create an individual
incentive for data owners. A platform that allows data owners to control,
delete, and get rewards from sharing their data would be an important enabler
of user data-sharing. We propose a usable blockchain- and smart contracts-based
framework that allows users to store research data locally and share without
losing control and ownership of it. We have created smart contracts for
building automatic verification of the conditions for data access that also
naturally supports building up a verifiable record of the provenance,
incentives for users to share their data and accountability of access. The
paper presents a review of the existing work of research data sharing, the
proposed blockchain-based framework and an evaluation of the framework by
measuring the transaction cost for smart contracts deployment. The results show
that nodes responded quickly in all tested cases with a befitting transaction
cost.
|
cs.*
|
Multi-dimensional arrays are among the most fundamental and most useful data
structures of all. In C++, excellent template libraries exist for arrays whose
dimension is fixed at runtime. Arrays whose dimension can change at runtime
have been implemented in C. However, a generic object-oriented C++
implementation of runtime-flexible arrays has so far been missing. In this
article, we discuss our new implementation called Marray, a package of class
templates that fills this gap. Marray is based on views as an underlying
concept. This concept brings some of the flexibility known from script
languages such as R and MATLAB to C++. Marray is free both for commercial and
non-commercial use and is publicly available from www.andres.sc/marray
|
cs.*
|
The resurgence of near-memory processing (NMP) with the advent of big data
has shifted the computation paradigm from processor-centric to memory-centric
computing. To meet the bandwidth and capacity demands of memory-centric
computing, 3D memory has been adopted to form a scalable memory-cube network.
Along with NMP and memory system development, the mapping for placing data and
guiding computation in the memory-cube network has become crucial in driving
the performance improvement in NMP. However, it is very challenging to design a
universal optimal mapping for all applications due to unique application
behavior and intractable decision space. In this paper, we propose an
artificially intelligent memory mapping scheme, AIMM, that optimizes data
placement and resource utilization through page and computation remapping. Our
proposed technique involves continuously evaluating and learning the impact of
mapping decisions on system performance for any application. AIMM uses a neural
network to achieve a near-optimal mapping during execution, trained using a
reinforcement learning algorithm that is known to be effective for exploring a
vast design space. We also provide a detailed AIMM hardware design that can be
adopted as a plugin module for various NMP systems. Our experimental evaluation
shows that AIMM improves the baseline NMP performance in single and multiple
program scenario by up to 70% and 50%, respectively.
|
cs.*
|
Virtual memory is an essential mechanism for enforcing security boundaries,
but its relaxed-memory concurrency semantics has not previously been
investigated in detail. The concurrent systems code managing virtual memory has
been left on an entirely informal basis, and OS and hypervisor verification has
had to make major simplifying assumptions.
We explore the design space for relaxed virtual memory semantics in the
Armv8-A architecture, to support future system-software verification. We
identify many design questions, in discussion with Arm; develop a test suite,
including use cases from the pKVM production hypervisor under development by
Google; delimit the design space with axiomatic-style concurrency models; prove
that under simple stable configurations our architectural model collapses to
previous "user" models; develop tooling to compute allowed behaviours in the
model integrated with the full Armv8-A ISA semantics; and develop a hardware
test harness.
This lays out some of the main issues in relaxed virtual memory bringing
these security-critical systems phenomena into the domain of
programming-language semantics and verification with foundational architecture
semantics.
This document is an extended version of a paper in ESOP 2022, with additional
explanation and examples in the main body, and appendices detailing our litmus
tests, models, proofs, and test results.
|
cs.*
|
In this work, we discuss multiplayer pervasive games that rely on the use of
ad hoc mobile sensor networks. The unique feature in such games is that players
interact with each other and their surrounding environment by using movement
and presence as a means of performing game-related actions, utilizing sensor
devices. We discuss the fundamental issues and challenges related to these type
of games and the scenarios associated with them. We also present and evaluate
an example of such a game, called the "Hot Potato", developed using the Sun
SPOT hardware platform. We provide a set of experimental results, so as to both
evaluate our implementation and also to identify issues that arise in pervasive
games which utilize sensor network nodes, which show that there is great
potential in this type of games.
|
cs.*
|
The oscillator-based Ising machine (OIM) is a network of coupled CMOS
oscillators that solves combinatorial optimization problems. In this paper, the
distribution of the injection-locking oscillations throughout the circuit is
proposed to accelerate the phase-locking of the OIM. The implications of the
proposed technique theoretically investigated and verified by extensive
simulations in EDA tools with a $130~nm$ PTM model. By distributing the
injective signal of the super-harmonic oscillator, the speed is increased by
$219.8\%$ with negligible increase in the power dissipation and phase-locking
error of the device due to the distributed technique.
|
cs.*
|
We discuss the use of projects in first-year graduate complexity theory
courses.
|
cs.*
|
The Grateful Dead were an American band that was born out of the San
Francisco, California psychedelic movement of the 1960s. The band played music
together from 1965 to 1995 and is well known for concert performances
containing extended improvisations and long and unique set lists. This article
presents a comparative analysis between 1,590 of the Grateful Dead's concert
set lists from 1972 to 1995 and 2,616,990 last.fm Grateful Dead listening
events from August 2005 to October 2007. While there is a strong correlation
between how songs were played in concert and how they are listened to by
last.fm members, the outlying songs in this trend identify interesting aspects
of the band and their fans 10 years after the band's dissolution.
|
cs.*
|
In university programs and curricula, in general we react to the need to meet
market needs. We respond to market stimulus, or at least try to do so. Consider
now an inverted view. Consider our data and perspectives in university programs
as reflecting and indeed presaging economic trends. In this article I pursue
this line of thinking. I show how various past events fit very well into this
new view. I provide explanation for why some technology trends happened as they
did, and why some current developments are important now.
|
cs.*
|
Participating a scientific workshop is nowadays often an adventure because
the number of participants do seldom exceed the number of talks. A half-day
workshop is mostly finished at lunchtime, speakers are sometimes not present
and unexcused, and a strict progression of the workshop offers little air for
discussion. And when talks are re-scheduled on short notice in case that a
speech is dropped out, attaining guests definitely wonder why the presenter is
talking about something that does not match the previously announced talk. In
this respect, we believe that the organization of a workshop in the classical
sense must be reconsidered. It is not enough of compelling the presenters to
pay the registration fee only and to let the participants being impassive or
taken away mentally. With this work, we address several propositions to become
implemented in the future workshop organization. With that, we hope to
contribute to the identification of scientific workshops as a place of
interaction.
|
cs.*
|
We propose an explanatory and computational theory of transformative
discoveries in science. The theory is derived from a recurring theme found in a
diverse range of scientific change, scientific discovery, and knowledge
diffusion theories in philosophy of science, sociology of science, social
network analysis, and information science. The theory extends the concept of
structural holes from social networks to a broader range of associative
networks found in science studies, especially including networks that reflect
underlying intellectual structures such as co-citation networks and
collaboration networks. The central premise is that connecting otherwise
disparate patches of knowledge is a valuable mechanism of creative thinking in
general and transformative scientific discovery in particular.
|
cs.*
|
In this paper we present the process of Knowledge Elicitation through a
structured questionnaire technique. This is an effort to depict a problem
domain as Investigation of factors affecting taskforce productivity. The
problem has to be solved using the expert system technology. This problem is
the very first step how to acquire knowledge from the domain experts. Knowledge
Elicitation is one of the difficult tasks in knowledge base formation which is
a key component of expert system. The questionnaire was distributed among 105
different domain experts of Public and Private Organizations (i.e. Education
Institutions, Industries and Research etc) in Pakistan. A total 61 responses
from these experts were received. All the experts were well qualified, highly
experienced and has been remained the members for selection committees a number
of times for different posts. Facts acquired were analyzed from which knowledge
was extracted and elicited. A standard shape was given to the questionnaire for
further research as a knowledge learning tool. This tool may be used as a
standard document for selection and promotion of employees.
|
cs.*
|
This paper sets out to examine the skills gaps between the industrial
application of Information Technology and university academic programmes
(curriculum). It looks at some of the causes, and considers the probable
solutions for bridging the gap between them and suggests the possibilities of
exploring a new role for our universities and employers of labor. It also
highlights strategies to abolish the misalignment between university and
industry. The main concept is to blend the academic rigidity with the
industrial relevance.
|
cs.*
|
In recent years environmental and energy conservation issues have taken the
central theme in the global business arena. The reality of rising energy cost
and their impact on international affairs coupled with the different kinds of
environmental issues has shifted the social and economic consciousness of the
business community. Hence, the business community is now in search of an
eco-friendly business model. This paper highlights the concept of green
business and their needs in the current global scenario.
|
cs.*
|
The safety, mobility, environmental, energy, and economic benefits of
transportation systems, which are the focus of recent connected vehicle (CV)
programs, are potentially dramatic. However, realization of these benefits
largely hinges on the timely integration of digital technology into upcoming as
well as existing transportation infrastructure. CVs must be enabled to
broadcast and receive data to and from other CVs [vehicle-to-vehicle (V2V)
communication], to and from infrastructure [vehicle-to-infrastructure (V2I)
communication], and to and from other road users, such as bicyclists or
pedestrians (vehicle-to-other road users communication). Further, the
infrastructure and transportation agencies that manage V2I-focused applications
must be able to collect, process, distribute, and archive these data quickly,
reliably, and securely. This paper focuses on V2I applications and investigates
current digital roadway infrastructure initiatives. It highlights the
importance of including digital infrastructure investment alongside investment
in more traditional transportation infrastructure to keep up with the auto
industry push toward increasing intervehicular communication. By studying
current CV testbeds and smart-city initiatives, this paper identifies digital
infrastructure being used by public agencies. It also examines public agencies
limited budgeting for digital infrastructure and finds that current expenditure
is inadequate for realizing the potential benefits of V2I applications.
Finally, the paper presents a set of recommendations, based on a review of
current practices and future needs, designed to guide agencies responsible for
transportation infrastructure. It stresses the importance of collaboration for
establishing national and international platforms for the planning, deployment,
and management of digital infrastructure to support connected transportation
systems.
|
cs.*
|
Philosophical thinking has a side effect: by aiming to find the essence of a
diverse set of phenomena, it often makes it difficult to see the differences
between them. This can be the case with Mathematics, Programming, Writing and
Philosophy itself. Their unified essence is having a shared understanding of
the world helped by off-loading our cognitive efforts to suitable languages.
|
cs.*
|
"Fake news" is a recent phenomenon, but misinformation and propaganda are
not. Our new communication technologies make it easy for us to be exposed to
high volumes of true, false, irrelevant, and unprovable information. Future AI
is expected to amplify the problem even more. At the same time, our brains are
reaching their limits in handling information. How should we respond to
propaganda? Technology can help, but relying on it alone will not suffice in
the long term. We also need ethical policies, laws, regulations, and trusted
authorities, including fact-checkers. However, we will not solve the problem
without the active engagement of the educated citizen. Epistemological
education, recognition of self biases and protection of our channels of
communication and trusted networks are all needed to overcome the problem and
continue our progress as democratic societies.
|
cs.*
|
Over the last two decades, the majority of German universities adopted
various characteristics of the prevailing North-American academic system,
resulting in significant changes in several key areas that include, e.g., both
teaching and research. The universities' internal organizational structures,
however, still follow a traditional, decentralized scheme implementing an
additional organizational level -- the Chair -- effectively a "mini department"
with dedicated staff, budget and infrastructure. Although the Technical
University of Munich (TUM) has been establishing a more centralized scheme for
many administrative tasks over the past decade, the transition from its
distributed to a centralized information technology (IT) administration and
infrastructure is still an ongoing process. In case of the authors' chair, this
migration so far included handing over all network-related operations to the
joint compute center, consolidating the Chair's legacy server system in terms
of both hardware architectures and operating systems and, lately, moving
selected services to replacements operated by Department or University. With
requirements, individuals and organizations constantly shifting, this process,
however, is neither close to completion nor particularly unique to TUM. In this
paper, we will thus share our experiences w.r.t. this IT migration as we
believe both that many of the other German universities might be facing similar
challenges and that, in the future, North-American universities - currently not
implementing the chair layer and instead relying on a centralized IT
infrastructure - could need a more decentralized solution. Hoping that both
benefit from this journey, we thus present the design, commissioning and
evolution of our infrastructure.
|
cs.*
|
This article gives a methodological overview of Value-based Engineering for
ethics by design. It discusses key challenges and measures involved in
eliciting, conceptualizing, prioritizing and respecting values in system
design. Thereby it draws from software engineering, value sensitive design,
design thinking and participatory design as well as from philosophical sources,
especially Material Ethics of Value. The article recognizes timely challenges
for Value-based Engineering, such as compatibility with agile forms of system
development, responsibility in hardly controllable ecosystems of interconnected
services, fearless integration of external stakeholders and the difficulty in
measuring the ethicality of a system. Finally, the Value-based Engineering
methodology presented here benefits from learnings collected in the IEEE P7000
standardization process as well as from a case study. P7000 has been set up by
IEEE to establish a process model, which addresses ethical considerations
throughout the various stages of system initiation, analysis and design.
|
cs.*
|
The global energy system is undergoing a major transition, and in energy
planning and decision-making across governments, industry and academia, models
play a crucial role. Because of their policy relevance and contested nature,
the transparency and open availability of energy models and data are of
particular importance. Here we provide a practical how-to guide based on the
collective experience of members of the Open Energy Modelling Initiative
(Openmod). We discuss key steps to consider when opening code and data,
including determining intellectual property ownership, choosing a licence and
appropriate modelling languages, distributing code and data, and providing
support and building communities. After illustrating these decisions with
examples and lessons learned from the community, we conclude that even though
individual researchers' choices are important, institutional changes are still
also necessary for more openness and transparency in energy research.
|
cs.*
|
Scientific code is not production software. Scientific code participates in
the evaluation of a scientific hypothesis. This imposes specific constraints on
the code that are often overlooked in practice. We articulate, with a small
example, five characteristics that a scientific code in computational science
should possess: re-runnable, repeatable, reproducible, reusable and replicable.
|
cs.*
|
This survey article provides a synopsis on some of the engineering problems,
technological innovations, robotic development and automation efforts
encountered in the mining industry -- particularly in the Pilbara iron-ore
region of Western Australia. The goal is to paint the technology landscape and
highlight issues relevant to an engineering audience to raise awareness of AI
and automation trends in mining. It assumes the reader has no prior knowledge
of mining and builds context gradually through focused discussion and short
summaries of common open-pit mining operations. The principal activities that
take place may be categorized in terms of resource development, mine-, rail-
and port operations. From mineral exploration to ore shipment, there are
roughly nine steps in between. These include: geological assessment, mine
planning and development, production drilling and assaying, blasting and
excavation, transportation of ore and waste, crush and screen, stockpile and
load-out, rail network distribution, and ore-car dumping. The objective is to
describe these processes and provide insights on some of the
challenges/opportunities from the perspective of a decade-long
industry-university R&D partnership.
|
cs.*
|
This volume contains the papers accepted at the 1st Workshop on Resource
Awareness and Adaptivity in Multi-Core Computing (Racing 2014), held in
Paderborn, Germany, May 29-30, 2014. Racing 2014 was co-located with the IEEE
European Test Symposium (ETS).
|
cs.*
|
Smart Cities already surround us, and yet they are still incomprehensibly far
from directly impacting everyday life. While current Smart Cities are often
inaccessible, the experience of everyday citizens may be enhanced with a
combination of the emerging technologies Digital Twins (DTs) and Situated
Analytics. DTs represent their Physical Twin (PT) in the real world via models,
simulations, (remotely) sensed data, context awareness, and interactions.
However, interaction requires appropriate interfaces to address the complexity
of the city. Ultimately, leveraging the potential of Smart Cities requires
going beyond assembling the DT to be comprehensive and accessible. Situated
Analytics allows for the anchoring of city information in its spatial context.
We advance the concept of embedding the DT into the PT through Situated
Analytics to form Fused Twins (FTs). This fusion allows access to data in the
location that it is generated in an embodied context that can make the data
more understandable. Prototypes of FTs are rapidly emerging from different
domains, but Smart Cities represent the context with the most potential for FTs
in the future. This paper reviews DTs, Situated Analytics, and Smart Cities as
the foundations of FTs. Regarding DTs, we define five components (Physical,
Data, Analytical, Virtual, and Connection environments) that we relate to
several cognates (i.e., similar but different terms) from existing literature.
Regarding Situated Analytics, we review the effects of user embodiment on
cognition and cognitive load. Finally, we classify existing partial examples of
FTs from the literature and address their construction from Augmented Reality,
Geographic Information Systems, Building/City Information Models, and DTs and
provide an overview of future direction
|
cs.*
|
As demand for Real-Time applications rises among the general public, the
importance of enabling large-scale, unbound algorithms to solve conventional
problems with low to no latency is critical for product viability. Timer
algorithms are prevalent in the core mechanisms behind operating systems,
network protocol implementation, stream processing, and several database
capabilities. This paper presents a field-tested algorithm for low latency,
unbound range timer structure, based upon the well excepted Timing Wheel
algorithm. Using a set of queues hashed by TTL, the algorithm allows for a
simpler implementation, minimal overhead no overflow and no performance
degradation in comparison to the current state of the algorithms under typical
use cases.
|
cs.*
|
Earth system models (ESM) demand significant hardware resources and energy
consumption to solve atmospheric chemistry processes. Recent studies have shown
improved performance from running these models on GPU accelerators.
Nonetheless, there is room for improvement in exploiting even more GPU
resources.
This study proposes an optimized distribution of the chemical solver's
computational load on the GPU, named Block-cells. Additionally, we evaluate
different configurations for distributing the computational load in an NVIDIA
GPU.
We use the linear solver from the Chemistry Across Multiple Phases (CAMP)
framework as our test bed. An intermediate-complexity chemical mechanism under
typical atmospheric conditions is used. Results demonstrate a 35x speedup
compared to the single-CPU thread reference case. Even using the full resources
of the node (40 physical cores) on the reference case, the Block-cells version
outperforms them by 50%. The Block-cells approach shows promise in alleviating
the computational burden of chemical solvers on GPU architectures.
|
cs.*
|
Citadel is an advanced information-stealing malware which targets financial
information. This malware poses a real threat against the confidentiality and
integrity of personal and business data. A joint operation was recently
conducted by the FBI and the Microsoft Digital Crimes Unit in order to take
down Citadel command-and-control servers. The operation caused some disruption
in the botnet but has not stopped it completely. Due to the complex structure
and advanced anti-reverse engineering techniques, the Citadel malware analysis
process is both challenging and time-consuming. This allows cyber criminals to
carry on with their attacks while the analysis is still in progress. In this
paper, we present the results of the Citadel reverse engineering and provide
additional insight into the functionality, inner workings, and open source
components of the malware. In order to accelerate the reverse engineering
process, we propose a clone-based analysis methodology. Citadel is an offspring
of a previously analyzed malware called Zeus; thus, using the former as a
reference, we can measure and quantify the similarities and differences of the
new variant. Two types of code analysis techniques are provided in the
methodology, namely assembly to source code matching and binary clone
detection. The methodology can help reduce the number of functions requiring
manual analysis. The analysis results prove that the approach is promising in
Citadel malware analysis. Furthermore, the same approach is applicable to
similar malware analysis scenarios.
|
cs.*
|
Visualizations are common methods to convey information but also increasingly
used to spread misinformation. It is therefore important to understand the
factors people use to interpret visualizations. In this paper, we focus on
factors that influence interpretations of scatter plots, investigating the
extent to which common visual aspects of scatter plots (outliers and trend
lines) and cognitive biases (people's beliefs) influence perception of
correlation trends. We highlight three main findings: outliers skew trend
perception but exert less influence than other points; trend lines make trends
seem stronger but also mitigate the influence of some outliers; and people's
beliefs have a small influence on perceptions of weak, but not strong
correlations. From these results we derive guidelines for adjusting visual
elements to mitigate the influence of factors that distort interpretations of
scatter plots. We explore how these guidelines may generalize to other
visualization types and make recommendations for future studies.
|
cs.*
|
Online forums provide rich environments where users may post questions and
comments about different topics. Understanding how people behave in online
forums may shed light on the fundamental mechanisms by which collective
thinking emerges in a group of individuals, but it has also important practical
applications, for instance to improve user experience, increase engagement or
automatically identify bullying. Importantly, the datasets generated by the
activity of the users are often openly available for researchers, in contrast
to other sources of data in computational social science. In this survey, we
map the main research directions that arose in recent years and focus primarily
on the most popular platform, Reddit. We distinguish and categorise research
depending on their focus on the posts or on the users, and point to different
types of methodologies to extract information from the structure and dynamics
of the system. We emphasize the diversity and richness of the research in terms
of questions and methods, and suggest future avenues of research.
|
cs.*
|
Transmission line, or wire, is always troublesome to integrated circuits
designers, but it could be helpful to parallel computing researchers. This
paper proposes the Virtual Transmission Method (VTM), which is a new
distributed and stationary iterative algorithm to solve the linear system
extracted from circuit. It tears the circuit by virtual transmission lines to
achieve distributed computing. For the symmetric positive definite (SPD) linear
system, VTM is proved to be convergent. For the unsymmetrical linear system,
numerical experiments show that VTM is possible to achieve better convergence
property than the traditional stationary algorithms. VTM could be accelerated
by some preconditioning techniques, and the convergence speed of VTM is fast
when its preconditioner is properly chosen.
|
cs.*
|
The use of the un-indexed web, commonly known as the deep web and dark web,
to commit or facilitate criminal activity has drastically increased over the
past decade. The dark web is an in-famously dangerous place where all kinds of
criminal activities take place [1-2], despite advances in web forensics
techniques, tools, and methodologies, few studies have formally tackled the
dark and deep web forensics and the technical differences in terms of
investigative techniques and artefacts identification and extraction. This
research proposes a novel and comprehensive protocol to guide and assist
digital forensics professionals in investigating crimes committed on or via the
deep and dark web, The protocol named D2WFP establishes a new sequential
approach for performing investigative activities by observing the order of
volatility and implementing a systemic approach covering all browsing related
hives and artefacts which ultimately resulted into improv-ing the accuracy and
effectiveness. Rigorous quantitative and qualitative research has been
conducted by assessing D2WFP following a scientifically-sound and comprehensive
process in different scenarios and the obtained results show an apparent
increase in the number of artefacts re-covered when adopting D2WFP which
outperform any current industry or opensource browsing forensics tools. The
second contribution of D2WFP is the robust formulation of artefact correlation
and cross-validation within D2WFP which enables digital forensics professionals
to better document and structure their analysis of host-based deep and dark web
browsing artefacts.
|
cs.*
|
This thesis is concerned with investigations into the "complexity of term
rewriting systems". Moreover the majority of the presented work deals with the
"automation" of such a complexity analysis. The aim of this introduction is to
present the main ideas in an easily accessible fashion to make the result
presented accessible to the general public. Necessarily some technical points
are stated in an over-simplified way.
|
cs.*
|
Many emerging Web services, such as email, photo sharing, and web site
archives, need to preserve large amounts of quickly-accessible data
indefinitely into the future. In this paper, we make the case that these
applications' demands on large scale storage systems over long time horizons
require us to re-evaluate traditional storage system designs. We examine
threats to long-lived data from an end-to-end perspective, taking into account
not just hardware and software faults but also faults due to humans and
organizations. We present a simple model of long-term storage failures that
helps us reason about the various strategies for addressing these threats in a
cost-effective manner. Using this model we show that the most important
strategies for increasing the reliability of long-term storage are detecting
latent faults quickly, automating fault repair to make it faster and cheaper,
and increasing the independence of data replicas.
|
cs.*
|
We demonstrate an application of the Futamura Projections to human-computer
interaction, and particularly to staging human-computer dialogs. Specifically,
by providing staging analogs to the classical Futamura Projections, we
demonstrate that the Futamura Projections can be applied to the staging of
human-computer dialogs in addition to the execution of programs.
|
cs.*
|
Virtual machines and virtualized hardware have been around for over half a
century. The commoditization of the x86 platform and its rapidly growing
hardware capabilities have led to recent exponential growth in the use of
virtualization both in the enterprise and high performance computing (HPC). The
startup time of a virtualized environment is a key performance metric for high
performance computing in which the runtime of any individual task is typically
much shorter than the lifetime of a virtualized service in an enterprise
context. In this paper, a methodology for accurately measuring the startup
performance on an HPC system is described. The startup performance overhead of
three of the most mature, widely deployed cloud management frameworks
(OpenStack, OpenNebula, and Eucalyptus) is measured to determine their
suitability for workloads typically seen in an HPC environment. A 10x
performance difference is observed between the fastest (Eucalyptus) and the
slowest (OpenNebula) framework. This time difference is primarily due to delays
in waiting on networking in the cloud-init portion of the startup. The
methodology and measurements presented should facilitate the optimization of
startup across a variety of virtualization environments.
|
cs.*
|
As the volume of data that needs to be processed continues to increase, we
also see renewed interests in near-data processing in the form of computational
storage, with eBPF (extended Berkeley Packet Filter) being proposed as a
vehicle for computation offloading. However, discussions in this regard have so
far ignored viable alternatives, and no convincing analysis has been provided.
As such, we qualitatively and quantitatively evaluated eBPF against
WebAssembly, a seemingly similar technology, in the context of computation
offloading. This report presents our findings.
|
cs.*
|
Today's computing is told to be based on the classic paradigm, proposed by
von Neumann, a three-quarter century ago. However, that paradigm was justified
(for the timing relations of) vacuum tubes only. The technological development
invalidated the classic paradigm (but not the model!) and led to catastrophic
performance losses in computing systems, from operating gate level to large
networks, including the neuromorphic ones. The paper reviews the critical
points of the classic paradigm and scrutinizes the confusion made around it. It
discusses some of the consequences of improper technological implementation,
from the shared media to the parallelized operation. The model is perfect, but
it is applied outside of its range of validity. The paradigm is extended by
providing the "procedure" that enables computing science to work with cases
where the transfer time is not negligible apart from processing time.
|
cs.*
|
We prove a conjecture of Courcelle, which states that a graph property is
definable in MSO with modular counting predicates on graphs of constant
treewidth if, and only if it is recognizable in the following sense:
constant-width tree decompositions of graphs satisfying the property can be
recognized by tree automata. While the forward implication is a classic fact
known as Courcelle's theorem, the converse direction remained open
|
cs.*
|
Increasing amounts of data from varied sources, particularly in the fields of
machine learning and graph analytics, are causing storage requirements to grow
rapidly. A variety of technologies exist for storing and sharing these data,
ranging from parallel file systems used by supercomputers to distributed block
storage systems found in clouds. Relatively few comparative measurements exist
to inform decisions about which storage systems are best suited for particular
tasks. This work provides these measurements for two of the most popular
storage technologies: Lustre and Amazon S3. Lustre is an open-source, high
performance, parallel file system used by many of the largest supercomputers in
the world. Amazon's Simple Storage Service, or S3, is part of the Amazon Web
Services offering, and offers a scalable, distributed option to store and
retrieve data from anywhere on the Internet. Parallel processing is essential
for achieving high performance on modern storage systems. The performance tests
used span the gamut of parallel I/O scenarios, ranging from single-client,
single-node Amazon S3 and Lustre performance to a large-scale, multi-client
test designed to demonstrate the capabilities of a modern storage appliance
under heavy load. These results show that, when parallel I/O is used correctly
(i.e., many simultaneous read or write processes), full network bandwidth
performance is achievable and ranged from 10 gigabits/s over a 10 GigE S3
connection to 0.35 terabits/s using Lustre on a 1200 port 10 GigE switch. These
results demonstrate that S3 is well-suited to sharing vast quantities of data
over the Internet, while Lustre is well-suited to processing large quantities
of data locally.
|
cs.*
|
We propose GraphMineSuite (GMS): the first benchmarking suite for graph
mining that facilitates evaluating and constructing high-performance graph
mining algorithms. First, GMS comes with a benchmark specification based on
extensive literature review, prescribing representative problems, algorithms,
and datasets. Second, GMS offers a carefully designed software platform for
seamless testing of different fine-grained elements of graph mining algorithms,
such as graph representations or algorithm subroutines. The platform includes
parallel implementations of more than 40 considered baselines, and it
facilitates developing complex and fast mining algorithms. High modularity is
possible by harnessing set algebra operations such as set intersection and
difference, which enables breaking complex graph mining algorithms into simple
building blocks that can be separately experimented with. GMS is supported with
a broad concurrency analysis for portability in performance insights, and a
novel performance metric to assess the throughput of graph mining algorithms,
enabling more insightful evaluation. As use cases, we harness GMS to rapidly
redesign and accelerate state-of-the-art baselines of core graph mining
problems: degeneracy reordering (by up to >2x), maximal clique listing (by up
to >9x), k-clique listing (by 1.1x), and subgraph isomorphism (by up to 2.5x),
also obtaining better theoretical performance bounds.
|
cs.*
|
This paper presents a new algorithm for the fast, shared memory, multi-core
computation of augmented contour trees on triangulations. In contrast to most
existing parallel algorithms our technique computes augmented trees, enabling
the full extent of contour tree based applications including data segmentation.
Our approach completely revisits the traditional, sequential contour tree
algorithm to re-formulate all the steps of the computation as a set of
independent local tasks. This includes a new computation procedure based on
Fibonacci heaps for the join and split trees, two intermediate data structures
used to compute the contour tree, whose constructions are efficiently carried
out concurrently thanks to the dynamic scheduling of task parallelism. We also
introduce a new parallel algorithm for the combination of these two trees into
the output global contour tree. Overall, this results in superior time
performance in practice, both in sequential and in parallel thanks to the
OpenMP task runtime. We report performance numbers that compare our approach to
reference sequential and multi-threaded implementations for the computation of
augmented merge and contour trees. These experiments demonstrate the run-time
efficiency of our approach and its scalability on common workstations. We
demonstrate the utility of our approach in data segmentation applications.
|
cs.*
|
With the advent of multi-core processors, network-on-chip design has been key
in addressing network performances, such as bandwidth, power consumption, and
communication delays when dealing with on-chip communication between the
increasing number of processor cores. As the numbers of cores increase, network
design becomes more complex. Therefore, there is a critical need in soliciting
computer aid in determining network configurations that afford optimal
performance given resources and design constraints. We propose a
Pareto-optimization framework that explores the space of possible network
configurations to determine optimal network latencies, power consumption, and
the corresponding link allocations. For a given number of routers, average
network latency and power consumption as example performance objectives can be
displayed in form of Pareto-optimal fronts, thus not only offering a design
tool, but also enabling trade-off studies.
|
cs.*
|
We present FLASH (\textbf{F}ast \textbf{L}SH \textbf{A}lgorithm for
\textbf{S}imilarity search accelerated with \textbf{H}PC), a similarity search
system for ultra-high dimensional datasets on a single machine, that does not
require similarity computations and is tailored for high-performance computing
platforms. By leveraging a LSH style randomized indexing procedure and
combining it with several principled techniques, such as reservoir sampling,
recent advances in one-pass minwise hashing, and count based estimations, we
reduce the computational and parallelization costs of similarity search, while
retaining sound theoretical guarantees.
We evaluate FLASH on several real, high-dimensional datasets from different
domains, including text, malicious URL, click-through prediction, social
networks, etc. Our experiments shed new light on the difficulties associated
with datasets having several million dimensions. Current state-of-the-art
implementations either fail on the presented scale or are orders of magnitude
slower than FLASH. FLASH is capable of computing an approximate k-NN graph,
from scratch, over the full webspam dataset (1.3 billion nonzeros) in less than
10 seconds. Computing a full k-NN graph in less than 10 seconds on the webspam
dataset, using brute-force ($n^2D$), will require at least 20 teraflops. We
provide CPU and GPU implementations of FLASH for replicability of our results.
|
cs.*
|
The Dynamic Distributed Dimensional Data Model (D4M) library implements
associative arrays in a variety of languages (Python, Julia, and Matlab/Octave)
and provides a lightweight in-memory database implementation of hypersparse
arrays that are ideal for analyzing many types of network data. D4M relies on
associative arrays which combine properties of spreadsheets, databases,
matrices, graphs, and networks, while providing rigorous mathematical
guarantees, such as linearity. Streaming updates of D4M associative arrays put
enormous pressure on the memory hierarchy. This work describes the design and
performance optimization of an implementation of hierarchical associative
arrays that reduces memory pressure and dramatically increases the update rate
into an associative array. The parameters of hierarchical associative arrays
rely on controlling the number of entries in each level in the hierarchy before
an update is cascaded. The parameters are easily tunable to achieve optimal
performance for a variety of applications. Hierarchical arrays achieve over
40,000 updates per second in a single instance. Scaling to 34,000 instances of
hierarchical D4M associative arrays on 1,100 server nodes on the MIT SuperCloud
achieved a sustained update rate of 1,900,000,000 updates per second. This
capability allows the MIT SuperCloud to analyze extremely large streaming
network data sets.
|
cs.*
|
People usually regard algorithms as more abstract than the programs that
implement them. The natural way to formalize this idea is that algorithms are
equivalence classes of programs with respect to a suitable equivalence
relation. We argue that no such equivalence relation exists.
|
cs.*
|
Concurrent multi-player mean-payoff games are important models for systems of
agents with individual, non-dichotomous preferences. Whilst these games have
been extensively studied in terms of their equilibria in non-cooperative
settings, this paper explores an alternative solution concept: the core from
cooperative game theory. This concept is particularly relevant for cooperative
AI systems, as it enables the modelling of cooperation among agents, even when
their goals are not fully aligned. Our contribution is twofold. First, we
provide a characterisation of the core using discrete geometry techniques and
establish a necessary and sufficient condition for its non-emptiness. We then
use the characterisation to prove the existence of polynomial witnesses in the
core. Second, we use the existence of such witnesses to solve key decision
problems in rational verification and provide tight complexity bounds for the
problem of checking whether some/every equilibrium in a game satisfies a given
LTL or GR(1) specification. Our approach is general and can be adapted to
handle other specifications expressed in various fragments of LTL without
incurring additional computational costs.
|
cs.*
|
Big data refers to large and complex data sets that, under existing
approaches, exceed the capacity and capability of current compute platforms,
systems software, analytical tools and human understanding. Numerous lessons on
the scalability of big data can already be found in asymptotic analysis of
algorithms and from the high-performance computing (HPC) and applications
communities. However, scale is only one aspect of current big data trends;
fundamentally, current and emerging problems in big data are a result of
unprecedented complexity--in the structure of the data and how to analyze it,
in dealing with unreliability and redundancy, in addressing the human factors
of comprehending complex data sets, in formulating meaningful analyses, and in
managing the dense, power-hungry data centers that house big data.
The computer science solution to complexity is finding the right
abstractions, those that hide as much triviality as possible while revealing
the essence of the problem that is being addressed. The "big data challenge"
has disrupted computer science by stressing to the very limits the familiar
abstractions which define the relevant subfields in data analysis, data
management and the underlying parallel systems. As a result, not enough of
these challenges are revealed by isolating abstractions in a traditional
software stack or standard algorithmic and analytical techniques, and attempts
to address complexity either oversimplify or require low-level management of
details. The authors believe that the abstractions for big data need to be
rethought, and this reorganization needs to evolve and be sustained through
continued cross-disciplinary collaboration.
|
cs.*
|
We should be in a golden age of scientific discovery, given that we have more
data and more compute power available than ever before, plus a new generation
of algorithms that can learn effectively from data. But paradoxically, in many
data-driven fields, the eureka moments are becoming increasingly rare.
Scientists are struggling to keep pace with the explosion in the volume and
complexity of scientific data. We describe here a few simple architectural
principles that we believe are essential in order to create effective, robust,
and flexible platforms that make the best use of emerging technology to deal
with the exponential growth of scientific data.
|
cs.*
|
As the usage of 3D models increases, so does the importance of developing
accurate 3D shape retrieval algorithms. A common approach is to calculate a
shape descriptor for each object, which can then be compared to determine two
objects' similarity. However, these descriptors are often evaluated
independently and on different datasets, making them difficult to compare.
Using the SHREC 2011 Shape Retrieval Contest of Non-rigid 3D Watertight Meshes
dataset, we systematically evaluate a collection of local shape descriptors. We
apply each descriptor to the bag-of-words paradigm and assess the effects of
varying the dictionary's size and the number of sample points. In addition,
several salient point detection methods are used to choose sample points; these
methods are compared to each other and to random selection. Finally,
information from two local descriptors is combined in two ways and changes in
performance are investigated. This paper presents results of these experiment
|
cs.*
|
A mesh is a graph that divides physical space into regularly-shaped regions.
Meshes computations form the basis of many applications, e.g. finite-element
methods, image rendering, and collision detection. In one important mesh
primitive, called a mesh update, each mesh vertex stores a value and repeatedly
updates this value based on the values stored in all neighboring vertices. The
performance of a mesh update depends on the layout of the mesh in memory.
This paper shows how to find a memory layout that guarantees that the mesh
update has asymptotically optimal memory performance for any set of memory
parameters. Such a memory layout is called cache-oblivious. Formally, for a
$d$-dimensional mesh $G$, block size $B$, and cache size $M$ (where
$M=\Omega(B^d)$), the mesh update of $G$ uses $O(1+|G|/B)$ memory transfers.
The paper also shows how the mesh-update performance degrades for smaller
caches, where $M=o(B^d)$.
The paper then gives two algorithms for finding cache-oblivious mesh layouts.
The first layout algorithm runs in time $O(|G|\log^2|G|)$ both in expectation
and with high probability on a RAM. It uses $O(1+|G|\log^2(|G|/M)/B)$ memory
transfers in expectation and $O(1+(|G|/B)(\log^2(|G|/M) + \log|G|))$ memory
transfers with high probability in the cache-oblivious and disk-access machine
(DAM) models. The layout is obtained by finding a fully balanced decomposition
tree of $G$ and then performing an in-order traversal of the leaves of the
tree. The second algorithm runs faster by almost a $\log|G|/\log\log|G|$ factor
in all three memory models, both in expectation and with high probability. The
layout obtained by finding a relax-balanced decomposition tree of $G$ and then
performing an in-order traversal of the leaves of the tree.
|
cs.*
|
In this paper we revisit the regular-language representation of game
semantics of second-order recursion free Idealized Algol with infinite data
types. By using symbolic values instead of concrete ones we generalize the
standard notion of regular-language and automata representations to that of
corresponding symbolic representations. In this way terms with infinite data
types, such as integers, can be expressed as finite symbolic-automata although
the standard automata interpretation is infinite. Moreover, significant
reductions of the state space of game semantics models are obtained. This
enables efficient verification of terms, which is illustrated with several
examples.
|
cs.*
|
In this paper, we consider the competitive diffusion game, and study the
existence of its pure-strategy Nash equilibrium when defined over general
undirected networks. We first determine the set of pure-strategy Nash
equilibria for two special but well-known classes of networks, namely the
lattice and the hypercube. Characterizing the utility of the players in terms
of graphical distances of their initial seed placements to other nodes in the
network, we show that in general networks the decision process on the existence
of pure-strategy Nash equilibrium is an NP-hard problem. Following this, we
provide some necessary conditions for a given profile to be a Nash equilibrium.
Furthermore, we study players' utilities in the competitive diffusion game over
Erdos-Renyi random graphs and show that as the size of the network grows, the
utilities of the players are highly concentrated around their expectation, and
are bounded below by some threshold based on the parameters of the network.
Finally, we obtain a lower bound for the maximum social welfare of the game
with two players, and study sub-modularity of the players' utilities.
|
cs.*
|
In this work we propose a generalization of Winfree's abstract Tile Assembly
Model (aTAM) in which tile types are assigned rigid shapes, or geometries,
along each tile face. We examine the number of distinct tile types needed to
assemble shapes within this model, the temperature required for efficient
assembly, and the problem of designing compact geometric faces to meet given
compatibility specifications. Our results show a dramatic decrease in the
number of tile types needed to assemble $n \times n$ squares to
$\Theta(\sqrt{\log n})$ at temperature 1 for the most simple model which meets
a lower bound from Kolmogorov complexity, and $O(\log\log n)$ in a model in
which tile aggregates must move together through obstacle free paths within the
plane. This stands in contrast to the $\Theta(\log n / \log\log n)$ tile types
at temperature 2 needed in the basic aTAM. We also provide a general method for
simulating a large and computationally universal class of temperature 2 aTAM
systems with geometric tiles at temperature 1. Finally, we consider the problem
of computing a set of compact geometric faces for a tile system to implement a
given set of compatibility specifications. We show a number of bounds on the
complexity of geometry size needed for various classes of compatibility
specifications, many of which we directly apply to our tile assembly results to
achieve non-trivial reductions in geometry size.
|
cs.*
|
Many-Fermion Dynamics-nuclear, or MFDn, is a configuration interaction (CI)
code for nuclear structure calculations. It is a platform-independent Fortran
90 code using a hybrid MPI+X programming model. For CPU platforms the
application has a robust and optimized OpenMP implementation for shared memory
parallelism. As part of the NESAP application readiness program for NERSC's
latest Perlmutter system, MFDn has been updated to take advantage of
accelerators. The current mainline GPU port is based on OpenACC. In this work
we describe some of the key challenges of creating an efficient GPU
implementation. Additionally, we compare the support of OpenMP and OpenACC on
AMD and NVIDIA GPUs.
|
cs.*
|
Efficient Nearest Neighbor (NN) search in high-dimensional spaces is a
foundation of many multimedia retrieval systems. Because it offers low
responses times, Product Quantization (PQ) is a popular solution. PQ compresses
high-dimensional vectors into short codes using several sub-quantizers, which
enables in-RAM storage of large databases. This allows fast answers to NN
queries, without accessing the SSD or HDD. The key feature of PQ is that it can
compute distances between short codes and high-dimensional vectors using
cache-resident lookup tables. The efficiency of this technique, named
Asymmetric Distance Computation (ADC), remains limited because it performs many
cache accesses.
In this paper, we introduce Quick ADC, a novel technique that achieves a 3 to
6 times speedup over ADC by exploiting Single Instruction Multiple Data (SIMD)
units available in current CPUs. Efficiently exploiting SIMD requires
algorithmic changes to the ADC procedure. Namely, Quick ADC relies on two key
modifications of ADC: (i) the use 4-bit sub-quantizers instead of the standard
8-bit sub-quantizers and (ii) the quantization of floating-point distances.
This allows Quick ADC to exceed the performance of state-of-the-art systems,
e.g., it achieves a Recall@100 of 0.94 in 3.4 ms on 1 billion SIFT descriptors
(128-bit codes).
|
cs.*
|
Many multimedia information retrieval or machine learning problems require
efficient high-dimensional nearest neighbor search techniques. For instance,
multimedia objects (images, music or videos) can be represented by
high-dimensional feature vectors. Finding two similar multimedia objects then
comes down to finding two objects that have similar feature vectors. In the
current context of mass use of social networks, large scale multimedia
databases or large scale machine learning applications are more and more
common, calling for efficient nearest neighbor search approaches.
This thesis builds on product quantization, an efficient nearest neighbor
search technique that compresses high-dimensional vectors into short codes.
This makes it possible to store very large databases entirely in RAM, enabling
low response times. We propose several contributions that exploit the
capabilities of modern CPUs, especially SIMD and the cache hierarchy, to
further decrease response times offered by product quantization.
|
cs.*
|
Many problems that arise in machine learning domain deal with nonlinearity
and quite often demand users to obtain global optimal solutions rather than
local optimal ones. Optimization problems are inherent in machine learning
algorithms and hence many methods in machine learning were inherited from the
optimization literature. Popularly known as the initialization problem, the
ideal set of parameters required will significantly depend on the given
initialization values. The recently developed TRUST-TECH (TRansformation Under
STability-reTaining Equilibria CHaracterization) methodology systematically
explores the subspace of the parameters to obtain a complete set of local
optimal solutions. In this thesis work, we propose TRUST-TECH based methods for
solving several optimization and machine learning problems. Two stages namely,
the local stage and the neighborhood-search stage, are repeated alternatively
in the solution space to achieve improvements in the quality of the solutions.
Our methods were tested on both synthetic and real datasets and the advantages
of using this novel framework are clearly manifested. This framework not only
reduces the sensitivity to initialization, but also allows the flexibility for
the practitioners to use various global and local methods that work well for a
particular problem of interest. Other hierarchical stochastic algorithms like
evolutionary algorithms and smoothing algorithms are also studied and
frameworks for combining these methods with TRUST-TECH have been proposed and
evaluated on several test systems.
|
cs.*
|
The world had witnessed several generations of the Internet. Starting with
the Fixed Internet, then the Mobile Internet, scientists now focus on many
types of research related to the "Thing" Internet (or Internet of Things). The
question is "what is the next Internet generation after the Thing Internet?"
This paper envisions about the Tactile Internet which could be the next
Internet generation in the near future. The paper will introduce what is the
tactile internet, why it could be the next future Internet, as well as the
impact and its application in the future society. Furthermore, some challenges
and the requirements are presented to guide further research in this near
future field.
|
cs.*
|
Research into, and design and construction of mobile systems and algorithms
requires access to large-scale mobility data. Unfortunately, the wireless and
mobile research community lacks such data. For instance, the largest available
human contact traces contain only 100 nodes with very sparse connectivity,
limited by experimental logistics. In this paper we pose a challenge to the
community: how can we collect mobility data from billions of human
participants? We re-assert the importance of large-scale datasets in
communication network design, and claim that this could impact fundamental
studies in other academic disciplines. In effect, we argue that planet-scale
mobility measurements can help to save the world. For example, through
understanding large-scale human mobility, we can track and model and contain
the spread of epidemics of various kinds.
|
cs.*
|
Constraint Handling Rules (CHR) is a committed-choice rule-based language
that was originally intended for writing constraint solvers. In this paper we
show that it is also possible to write the classic union-find algorithm and
variants in CHR. The programs neither compromise in declarativeness nor
efficiency. We study the time complexity of our programs: they match the
almost-linear complexity of the best known imperative implementations. This
fact is illustrated with experimental results.
|
cs.*
|
The Robot Operating System 2 (ROS2) targets distributed real-time systems and
is widely used in the robotics community. Especially in these systems, latency
in data processing and communication can lead to instabilities. Though being
highly configurable with respect to latency, ROS2 is often used with its
default settings.
In this paper, we investigate the end-to-end latency of ROS2 for distributed
systems with default settings and different Data Distribution Service (DDS)
middlewares. In addition, we profile the ROS2 stack and point out latency
bottlenecks. Our findings indicate that end-to-end latency strongly depends on
the used DDS middleware. Moreover, we show that ROS2 can lead to 50% latency
overhead compared to using low-level DDS communications. Our results imply
guidelines for designing distributed ROS2 architectures and indicate
possibilities for reducing the ROS2 overhead.
|
cs.*
|
For almost 35 years, Sch{\"o}nhage-Strassen's algorithm has been the fastest
algorithm known for multiplying integers, with a time complexity O(n $\times$
log n $\times$ log log n) for multiplying n-bit inputs. In 2007, F{\"u}rer
proved that there exists K > 1 and an algorithm performing this operation in
O(n $\times$ log n $\times$ K log n). Recent work by Harvey, van der Hoeven,
and Lecerf showed that this complexity estimate can be improved in order to get
K = 8, and conjecturally K = 4. Using an alternative algorithm, which relies on
arithmetic modulo generalized Fermat primes, we obtain conjecturally the same
result K = 4 via a careful complexity analysis in the deterministic multitape
Turing model.
|
cs.*
|
In 2012, Barbulescu, Detrey, Estibals and Zimmermann proposed a new framework
to exhaustively search for optimal formulae for evaluating bilinear maps, such
as Strassen or Karatsuba formulae. The main contribution of this work is a new
criterion to aggressively prune useless branches in the exhaustive search, thus
leading to the computation of new optimal formulae, in particular for the short
product modulo X 5 and the circulant product modulo (X 5 -- 1). Moreover , we
are able to prove that there is essentially only one optimal decomposition of
the product of 3 x 2 by 2 x 3 matrices up to the action of some group of
automorphisms.
|
cs.*
|
Computational modeling of neurodynamical systems often deploys neural
networks and symbolic dynamics. A particular way for combining these approaches
within a framework called vector symbolic architectures leads to neural
automata. An interesting research direction we have pursued under this
framework has been to consider mapping symbolic dynamics onto neurodynamics,
represented as neural automata. This representation theory, enables us to ask
questions, such as, how does the brain implement Turing computations.
Specifically, in this representation theory, neural automata result from the
assignment of symbols and symbol strings to numbers, known as G\"odel encoding.
Under this assignment symbolic computation becomes represented by trajectories
of state vectors in a real phase space, that allows for statistical correlation
analyses with real-world measurements and experimental data. However, these
assignments are usually completely arbitrary. Hence, it makes sense to address
the problem question of, which aspects of the dynamics observed under such a
representation is intrinsic to the dynamics and which are not. In this study,
we develop a formally rigorous mathematical framework for the investigation of
symmetries and invariants of neural automata under different encodings. As a
central concept we define patterns of equality for such systems. We consider
different macroscopic observables, such as the mean activation level of the
neural network, and ask for their invariance properties. Our main result shows
that only step functions that are defined over those patterns of equality are
invariant under recodings, while the mean activation is not. Our work could be
of substantial importance for related regression studies of real-world
measurements with neurosymbolic processors for avoiding confounding results
that are dependant on a particular encoding and not intrinsic to the dynamics.
|
cs.*
|
This paper presents an implementation of the
Schwerdtfeger-Fillmore-Springer-Cnops construction (SFSCc) along with
illustrations of its usage. SFSCc linearises the linear-fraction action of the
Moebius group in R^n. This has clear advantages in several theoretical and
applied fields including engineering. Our implementation is based on the
Clifford algebra capacities of the GiNaC computer algebra system
(http://www.ginac.de/), which were described in cs.MS/0410044.
The core of this realisation of SFSCc is done for an arbitrary dimension of
R^n with a metric given by an arbitrary bilinear form. We also present a
subclass for two dimensional cycles (i.e. circles, parabolas and hyperbolas),
which add some 2D specific routines including a visualisation to PostScript
files through the MetaPost (http://www.tug.org/metapost.html) or Asymptote
(http://asymptote.sourceforge.net/) packages.
This software is the backbone of many results published in math.CV/0512416
and we use its applications their for demonstration. The library can be ported
(with various level of required changes) to other CAS with Clifford algebras
capabilities similar to GiNaC.
There is an ISO image of a Live Debian DVD attached to this paper as an
auxiliary file, a copy is stored on Google Drive as well.
|
cs.*
|
Regular chains and triangular decompositions are fundamental and
well-developed tools for describing the complex solutions of polynomial
systems. This paper proposes adaptations of these tools focusing on solutions
of the real analogue: semi-algebraic systems. We show that any such system can
be decomposed into finitely many {\em regular semi-algebraic systems}. We
propose two specifications of such a decomposition and present corresponding
algorithms. Under some assumptions, one type of decomposition can be computed
in singly exponential time w.r.t.\ the number of variables. We implement our
algorithms and the experimental results illustrate their effectiveness.
|
cs.*
|
We propose to consider ensembles of cycles (quadrics), which are
interconnected through conformal-invariant geometric relations (e.g. "to be
orthogonal", "to be tangent", etc.), as new objects in an extended Moebius--Lie
geometry. It was recently demonstrated in several related papers, that such
ensembles of cycles naturally parameterise many other conformally-invariant
objects, e.g. loxodromes or continued fractions. The paper describes a method,
which reduces a collection of conformally invariant geometric relations to a
system of linear equations, which may be accompanied by one fixed quadratic
relation.
To show its usefulness, the method is implemented as a C++ library. It
operates with numeric and symbolic data of cycles in spaces of arbitrary
dimensionality and metrics with any signatures. Numeric calculations can be
done in exact or approximate arithmetic. In the two- and three-dimensional
cases illustrations and animations can be produced. An interactive Python
wrapper of the library is provided as well.
|
cs.*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.