text
stringlengths 29
3.76k
| label
stringclasses 8
values |
|---|---|
In this paper we provide a computational approach to the shape of curves
which are rational in polar coordinates, i.e. which are defined by means of a
parametrization (r(t),\theta(t)) where both r(t),\theta(t) are rational
functions. Our study includes theoretical aspects on the shape of these curves,
and algorithmic results which eventually lead to an algorithm for plotting the
"interesting parts" of the curve, i.e. the parts showing the main geometrical
features of it. On the theoretical side, we prove that these curves, with the
exceptions of lines and circles, cannot be algebraic (in cartesian
coordinates), we characterize the existence of infinitely many
self-intersections, and we connect this with certain phenomena which are not
possible in the algebraic world, namely the existence of limit circles, limit
points, or spiral branches. On the practical side, we provide an algorithm
which has been implemented in the computer algebra system Maple to visualize
this kind of curves. Our implementation makes use (and improves some aspects
of) the command polarplot currently available in Maple for plotting curves in
polar form.
|
cs.*
|
Several tools have been developed to enhance automation of theorem proving in
the 2D plane. However, in 3D, only a few approaches have been studied, and to
our knowledge, nothing has been done in higher dimensions. In this paper, we
present a few examples of incidence geometry theorems in dimensions 3, 4, and
5. We then prove them with the help of a combinatorial prover based on matroid
theory applied to geometry.
|
cs.*
|
We study the fair division problem of allocating a mixed manna under
additively separable piecewise linear concave (SPLC) utilities. A mixed manna
contains goods that everyone likes and bads that everyone dislikes, as well as
items that some like and others dislike. The seminal work of Bogomolnaia et al.
[Econometrica'17] argue why allocating a mixed manna is genuinely more
complicated than a good or a bad manna, and why competitive equilibrium is the
best mechanism. They also provide the existence of equilibrium and establish
its peculiar properties (e.g., non-convex and disconnected set of equilibria
even under linear utilities), but leave the problem of computing an equilibrium
open. This problem remained unresolved even for only bad manna under linear
utilities.
Our main result is a simplex-like algorithm based on Lemke's scheme for
computing a competitive allocation of a mixed manna under SPLC utilities, a
strict generalization of linear. Experimental results on randomly generated
instances suggest that our algorithm will be fast in practice. The problem is
known to be PPAD-hard for the case of good manna, and we also show a similar
result for the case of bad manna. Given these PPAD-hardness results, designing
such an algorithm is the only non-brute-force (non-enumerative) option known,
e.g., the classic Lemke-Howson algorithm (1964) for computing a Nash
equilibrium in a 2-player game is still one of the most widely used algorithms
in practice.
Our algorithm also yields several new structural properties as simple
corollaries. We obtain a (constructive) proof of existence for a far more
general setting, membership of the problem in PPAD, rational-valued solution,
and odd number of solutions property. The last property also settles the
conjecture of Bogomolnaia et al. in the affirmative.
|
cs.*
|
The SuiteSparse GraphBLAS C-library implements high performance hypersparse
matrices with bindings to a variety of languages (Python, Julia, and
Matlab/Octave). GraphBLAS provides a lightweight in-memory database
implementation of hypersparse matrices that are ideal for analyzing many types
of network data, while providing rigorous mathematical guarantees, such as
linearity. Streaming updates of hypersparse matrices put enormous pressure on
the memory hierarchy. This work benchmarks an implementation of hierarchical
hypersparse matrices that reduces memory pressure and dramatically increases
the update rate into a hypersparse matrices. The parameters of hierarchical
hypersparse matrices rely on controlling the number of entries in each level in
the hierarchy before an update is cascaded. The parameters are easily tunable
to achieve optimal performance for a variety of applications. Hierarchical
hypersparse matrices achieve over 1,000,000 updates per second in a single
instance. Scaling to 31,000 instances of hierarchical hypersparse matrices
arrays on 1,100 server nodes on the MIT SuperCloud achieved a sustained update
rate of 75,000,000,000 updates per second. This capability allows the MIT
SuperCloud to analyze extremely large streaming network data sets.
|
cs.*
|
Community structure is an important area of research. It has received a
considerable attention from the scientific community. Despite its importance,
one of the key problems in locating information about community detection is
the diverse spread of related articles across various disciplines. To the best
of our knowledge, there is no current comprehensive review of recent literature
which uses a scientometric analysis using complex networks analysis covering
all relevant articles from the Web of Science (WoS). Here we present a visual
survey of key literature using CiteSpace. The idea is to identify emerging
trends besides using network techniques to examine the evolution of the domain.
Towards that end, we identify the most influential, central, as well as active
nodes using scientometric analyses. We examine authors, key articles, cited
references, core subject categories, key journals, institutions, as well as
countries. The exploration of the scientometric literature of the domain
reveals that Yong Wang is a pivot node with the highest centrality.
Additionally, we have observed that Mark Newman is the most highly cited author
in the network. We have also identified that the journal, "Reviews of Modern
Physics" has the strongest citation burst. In terms of cited documents, an
article by Andrea Lancichinetti has the highest centrality score. We have also
discovered that the origin of the key publications in this domain is from the
United States. Whereas Scotland has the strongest and longest citation burst.
Additionally, we have found that the categories of "Computer Science" and
"Engineering" lead other categories based on frequency and centrality
respectively.
|
cs.*
|
Generating code from a natural language using Large Language Models (LLMs)
such as ChatGPT, seems groundbreaking. Yet, with more extensive use, it's
evident that this approach has its own limitations. The inherent ambiguity of
natural language presents challenges for complex software designs. Accordingly,
our research offers an Agile Model-Driven Development (MDD) approach that
enhances code auto-generation using OpenAI's GPT-4. Our work emphasizes
"Agility" as a significant contribution to the current MDD method, particularly
when the model undergoes changes or needs deployment in a different programming
language. Thus, we present a case-study showcasing a multi-agent simulation
system of an Unmanned Vehicle Fleet. In the first and second layer of our
approach, we constructed a textual representation of the case-study using
Unified Model Language (UML) diagrams. In the next layer, we introduced two
sets of constraints that minimize model ambiguity. Object Constraints Language
(OCL) is applied to fine-tune the code constructions details, while FIPA
ontology is used to shape communication semantics and protocols. Ultimately,
leveraging GPT-4, our last layer auto-generates code in both Java and Python.
The Java code is deployed within the JADE framework, while the Python code is
deployed in PADE framework. Concluding our research, we engaged in a
comprehensive evaluation of the generated code. From a behavioural standpoint,
the auto-generated code aligned perfectly with the expected UML sequence
diagram. Structurally, we compared the complexity of code derived from UML
diagrams constrained solely by OCL to that influenced by both OCL and
FIPA-ontology. Results indicate that ontology-constrained model produce
inherently more intricate code, but it remains manageable and low-risk for
further testing and maintenance.
|
cs.*
|
Scheduling policies for real-time systems exhibit threshold behavior that is
related to the utilization of the task set they schedule, and in some cases
this threshold is sharp. For the rate monotonic scheduling policy, we show that
periodic workload with utilization less than a threshold $U_{RM}^{*}$ can be
scheduled almost surely and that all workload with utilization greater than
$U_{RM}^{*}$ is almost surely not schedulable. We study such sharp threshold
behavior in the context of processor scheduling using static task priorities,
not only for periodic real-time tasks but for aperiodic real-time tasks as
well. The notion of a utilization threshold provides a simple schedulability
test for most real-time applications. These results improve our understanding
of scheduling policies and provide an interesting characterization of the
typical behavior of policies. The threshold is sharp (small deviations around
the threshold cause schedulability, as a property, to appear or disappear) for
most policies; this is a happy consequence that can be used to address the
limitations of existing utilization-based tests for schedulability. We
demonstrate the use of such an approach for balancing power consumption with
the need to meet deadlines in web servers.
|
cs.*
|
This short note reports a master theorem on tight asymptotic solutions to
divide-and-conquer recurrences with more than one recursive term: for example,
T(n) = 1/4 T(n/16) + 1/3 T(3n/5) + 4 T(n/100) + 10 T(n/300) + n^2.
|
cs.*
|
High performance multi-GPU computing becomes an inevitable trend due to the
ever-increasing demand on computation capability in emerging domains such as
deep learning, big data and planet-scale simulations. However, the lack of deep
understanding on how modern GPUs can be connected and the real impact of
state-of-the-art interconnect technology on multi-GPU application performance
become a hurdle. In this paper, we fill the gap by conducting a thorough
evaluation on five latest types of modern GPU interconnects: PCIe, NVLink-V1,
NVLink-V2, NVLink-SLI and NVSwitch, from six high-end servers and HPC
platforms: NVIDIA P100-DGX-1, V100-DGX-1, DGX-2, OLCF's SummitDev and Summit
supercomputers, as well as an SLI-linked system with two NVIDIA Turing RTX-2080
GPUs. Based on the empirical evaluation, we have observed four new types of GPU
communication network NUMA effects: three are triggered by NVLink's topology,
connectivity and routing, while one is caused by PCIe chipset design issue.
These observations indicate that, for an application running in a multi-GPU
node, choosing the right GPU combination can impose considerable impact on GPU
communication efficiency, as well as the application's overall performance. Our
evaluation can be leveraged in building practical multi-GPU performance models,
which are vital for GPU task allocation, scheduling and migration in a shared
environment (e.g., AI cloud and HPC centers), as well as communication-oriented
performance tuning.
|
cs.*
|
We show the first non-trivial positive algorithmic results (i.e. programs
whose output is larger than their size), in a model of self-assembly that has
so far resisted many attempts of formal analysis or programming: the planar
non-cooperative variant of Winfree's abstract Tile Assembly Model.
This model has been the center of several open problems and conjectures in
the last fifteen years, and the first fully general results on its
computational power were only proven recently (SODA 2014). These results, as
well as ours, exemplify the intricate connections between computation and
geometry that can occur in self-assembly.
In this model, tiles can stick to an existing assembly as soon as one of
their sides matches the existing assembly. This feature contrasts with the
general cooperative model, where it can be required that tiles match on
\emph{several} of their sides in order to bind.
In order to describe our algorithms, we also introduce a generalization of
regular expressions called Baggins expressions. Finally, we compare this model
to other automata-theoretic models.
|
cs.*
|
This volume contains the proceedings of MARS 2015, the first workshop on
Models for Formal Analysis of Real Systems, held on November 23, 2015 in Suva,
Fiji, as an affiliated workshop of LPAR 2015, the 20th International Conference
on Logic for Programming, Artificial Intelligence and Reasoning.
The workshop emphasises modelling over verification. It aims at discussing
the lessons learned from making formal methods for the verification and
analysis of realistic systems. Examples are:
(1) Which formalism is chosen, and why?
(2) Which abstractions have to be made and why?
(3) How are important characteristics of the system modelled?
(4) Were there any complications while modelling the system?
(5) Which measures were taken to guarantee the accuracy of the model?
We invited papers that present full models of real systems, which may lay the
basis for future comparison and analysis. An aim of the workshop is to present
different modelling approaches and discuss pros and cons for each of them.
Alternative formal descriptions of the systems presented at this workshop are
encouraged, which should foster the development of improved specification
formalisms.
|
cs.*
|
In the contemporary era, biodiversity conservation emerges as a paramount
challenge, necessitating innovative approaches to monitoring, preserving, and
enhancing the natural world. This paper explores the integration of blockchain
technology in biodiversity conservation, offering a novel perspective on how
digital resilience can be built within ecological contexts. Blockchain, with
its decentralized and immutable ledger and tokenization affordances, presents a
groundbreaking solution for the accurate monitoring and tracking of
environmental assets, thereby addressing the critical need for transparency and
trust in conservation efforts. Unlike previous more theoretical approaches, by
addressing the research question of how blockchain supports digital resilience
in biodiversity conservation, this study presents a grounded framework that
justifies which blockchain features are essential to decipher specific data
contribution and data leveraging processes in an effort to protect our planet's
biodiversity, while boosting potential economic benefits for all actors
involved, from local farmers, to hardware vendors and artificial intelligence
experts, to investors and regular users, volunteers and donors.
|
cs.*
|
Applying differentiable programming techniques and machine learning
algorithms to foreign programs requires developers to either rewrite their code
in a machine learning framework, or otherwise provide derivatives of the
foreign code. This paper presents Enzyme, a high-performance automatic
differentiation (AD) compiler plugin for the LLVM compiler framework capable of
synthesizing gradients of statically analyzable programs expressed in the LLVM
intermediate representation (IR). Enzyme synthesizes gradients for programs
written in any language whose compiler targets LLVM IR including C, C++,
Fortran, Julia, Rust, Swift, MLIR, etc., thereby providing native AD
capabilities in these languages. Unlike traditional source-to-source and
operator-overloading tools, Enzyme performs AD on optimized IR. On a
machine-learning focused benchmark suite including Microsoft's ADBench, AD on
optimized IR achieves a geometric mean speedup of 4.5x over AD on IR before
optimization allowing Enzyme to achieve state-of-the-art performance. Packaging
Enzyme for PyTorch and TensorFlow provides convenient access to gradients of
foreign code with state-of-the art performance, enabling foreign code to be
directly incorporated into existing machine learning workflows.
|
cs.*
|
Evaluation is a crucial aspect of human existence and plays a vital role in
various fields. However, it is often approached in an empirical and ad-hoc
manner, lacking consensus on universal concepts, terminologies, theories, and
methodologies. This lack of agreement has significant repercussions. This
article aims to formally introduce the discipline of evaluatology, which
encompasses the science and engineering of evaluation. We propose a universal
framework for evaluation, encompassing concepts, terminologies, theories, and
methodologies that can be applied across various disciplines.
Our research reveals that the essence of evaluation lies in conducting
experiments that intentionally apply a well-defined evaluation condition to
diverse subjects and infer the impact of different subjects by measuring and/or
testing. Derived from the essence of evaluation, we propose five axioms
focusing on key aspects of evaluation outcomes as the foundational evaluation
theory. These axioms serve as the bedrock upon which we build universal
evaluation theories and methodologies. When evaluating a single subject, it is
crucial to create evaluation conditions with different levels of equivalency.
By applying these conditions to diverse subjects, we can establish reference
evaluation models. These models allow us to alter a single independent variable
at a time while keeping all other variables as controls. When evaluating
complex scenarios, the key lies in establishing a series of evaluation models
that maintain transitivity. Building upon the science of evaluation, we propose
a formal definition of a benchmark as a simplified and sampled evaluation
condition that guarantees different levels of equivalency. This concept serves
as the cornerstone for a universal benchmark-based engineering approach to
evaluation across various disciplines, which we refer to as benchmarkology.
|
cs.*
|
To improve on existing models of interaction with a proof assistant (PA), in
particular for storage and replay of proofs, we in- troduce three related
concepts, those of: a proof movie, consisting of frames which record both user
input and the corresponding PA response; a camera, which films a user's
interactive session with a PA as a movie; and a proviola, which replays a movie
frame-by-frame to a third party. In this paper we describe the movie data
structure and we discuss a proto- type implementation of the camera and
proviola based on the ProofWeb system. ProofWeb uncouples the interaction with
a PA via a web- interface (the client) from the actual PA that resides on the
server. Our camera films a movie by "listening" to the ProofWeb communication.
The first reason for developing movies is to uncouple the reviewing of a formal
proof from the PA used to develop it: the movie concept enables users to
discuss small code fragments without the need to install the PA or to load a
whole library into it. Other advantages include the possibility to develop a
separate com- mentary track to discuss or explain the PA interaction. We assert
that a combined camera+proviola provides a generic layer between a client
(user) and a server (PA). Finally we claim that movies are the right type of
data to be stored in an encyclopedia of formalized mathematics, based on our
experience in filming the Coq standard library.
|
cs.*
|
Simple graph algorithms such as PageRank have been the target of numerous
hardware accelerators. Yet, there also exist much more complex graph mining
algorithms for problems such as clustering or maximal clique listing. These
algorithms are memory-bound and thus could be accelerated by hardware
techniques such as Processing-in-Memory (PIM). However, they also come with
nonstraightforward parallelism and complicated memory access patterns. In this
work, we address this problem with a simple yet surprisingly powerful
observation: operations on sets of vertices, such as intersection or union,
form a large part of many complex graph mining algorithms, and can offer rich
and simple parallelism at multiple levels. This observation drives our
cross-layer design, in which we (1) expose set operations using a novel
programming paradigm, (2) express and execute these operations efficiently with
carefully designed set-centric ISA extensions called SISA, and (3) use PIM to
accelerate SISA instructions. The key design idea is to alleviate the bandwidth
needs of SISA instructions by mapping set operations to two types of PIM:
in-DRAM bulk bitwise computing for bitvectors representing high-degree
vertices, and near-memory logic layers for integer arrays representing
low-degree vertices. Set-centric SISA-enhanced algorithms are efficient and
outperform hand-tuned baselines, offering more than 10x speedup over the
established Bron-Kerbosch algorithm for listing maximal cliques. We deliver
more than 10 SISA set-centric algorithm formulations, illustrating SISA's wide
applicability.
|
cs.*
|
Atomic operations (atomics) such as Compare-and-Swap (CAS) or Fetch-and-Add
(FAA) are ubiquitous in parallel programming. Yet, performance tradeoffs
between these operations and various characteristics of such systems, such as
the structure of caches, are unclear and have not been thoroughly analyzed. In
this paper we establish an evaluation methodology, develop a performance model,
and present a set of detailed benchmarks for latency and bandwidth of different
atomics. We consider various state-of-the-art x86 architectures: Intel Haswell,
Xeon Phi, Ivy Bridge, and AMD Bulldozer. The results unveil surprising
performance relationships between the considered atomics and architectural
properties such as the coherence state of the accessed cache lines. One key
finding is that all the tested atomics have comparable latency and bandwidth
even if they are characterized by different consensus numbers. Another insight
is that the hardware implementation of atomics prevents any instruction-level
parallelism even if there are no dependencies between the issued operations.
Finally, we discuss solutions to the discovered performance issues in the
analyzed architectures. Our analysis enables simpler and more effective
parallel programming and accelerates data processing on various architectures
deployed in both off-the-shelf machines and large compute systems.
|
cs.*
|
Mechanical assemblies can exhibit complex relative motions, during which
collisions between moving parts and their surroundings must be avoided. To
define feasible design spaces for each part's shape, "maximal" collision-free
pointsets can be computed using configuration space modeling techniques such as
Minkowski operations and sweep/unsweep. For example, for a pair of parts
undergoing a given relative motion, to make the problem well-posed, the
geometry of one part (chosen arbitrarily) must be fixed to compute the maximal
shape of the other part by an unsweep operation. Making such arbitrary choices
in a multi-component assembly can place unnecessary restrictions on the design
space. A broader family of collision-free pairs of parts can be explored, if
fixing the geometry of a component is not required. In this paper, we formalize
this family of collision-free shapes and introduce a generic method for
generating a broad subset of them. Our procedure, which is an extension of the
unsweep, allows for co-generation of a pair of geometries which are modified
incrementally and simultaneously to avoid collision. We demonstrate the
effectiveness and scalability of our procedure in both 2D and 3D by generating
a variety of collision-free shapes. Notably, we show that our approach can
automatically generate freeform cam and follower profiles, gear teeth, and
screw threads, starting from colliding blocks of materials, solely from a
specification of relative motion and without the use of any feature-informed
heuristics. Moreover, our approach provides continuous measures of collision
that can be incorporated into standard gradient-descent design optimization,
allowing for simultaneous collision-free and physics-informed co-design of
mechanical parts for assembly.
|
cs.*
|
FP8 formats are gaining popularity to boost the computational efficiency for
training and inference of large deep learning models. Their main challenge is
that a careful choice of scaling is needed to prevent degradation due to the
reduced dynamic range compared to higher-precision formats. Although there
exists ample literature about selecting such scalings for INT formats, this
critical aspect has yet to be addressed for FP8. This paper presents a
methodology to select the scalings for FP8 linear layers, based on dynamically
updating per-tensor scales for the weights, gradients and activations. We apply
this methodology to train and validate large language models of the type of GPT
and Llama 2 using FP8, for model sizes ranging from 111M to 70B. To facilitate
the understanding of the FP8 dynamics, our results are accompanied by plots of
the per-tensor scale distribution for weights, activations and gradients during
both training and inference.
|
cs.*
|
In this paper, we work on the notion of k-synchronizability: a system is
k-synchronizable if any of its executions, up to reordering causally
independent actions, can be divided into a succession of k-bounded interaction
phases. We show two results (both for mailbox and peer-to-peer automata):
first, the reachability problem is decidable for k-synchronizable systems;
second, the membership problem (whether a given system is k-synchronizable) is
decidable as well. Our proofs fix several important issues in previous attempts
to prove these two results for mailbox automata.
|
cs.*
|
Recent years have witnessed an increased interest in the application of
persistent homology, a topological tool for data analysis, to machine learning
problems. Persistent homology is known for its ability to numerically
characterize the shapes of spaces induced by features or functions. On the
other hand, deep neural networks have been shown effective in various tasks. To
our best knowledge, however, existing neural network models seldom exploit
shape information. In this paper, we investigate a way to use persistent
homology in the framework of deep neural networks. Specifically, we propose to
embed the so-called "persistence landscape," a rather new topological summary
for data, into a convolutional neural network (CNN) for dealing with audio
signals. Our evaluation on automatic music tagging, a multi-label
classification task, shows that the resulting persistent convolutional neural
network (PCNN) model can perform significantly better than state-of-the-art
models in prediction accuracy. We also discuss the intuition behind the design
of the proposed model, and offer insights into the features that it learns.
|
cs.*
|
We present a prototypical linear algebra compiler that automatically exploits
domain-specific knowledge to generate high-performance algorithms. The input to
the compiler is a target equation together with knowledge of both the structure
of the problem and the properties of the operands. The output is a variety of
high-performance algorithms, and the corresponding source code, to solve the
target equation. Our approach consists in the decomposition of the input
equation into a sequence of library-supported kernels. Since in general such a
decomposition is not unique, our compiler returns not one but a number of
algorithms. The potential of the compiler is shown by means of its application
to a challenging equation arising within the genome-wide association study. As
a result, the compiler produces multiple "best" algorithms that outperform the
best existing libraries.
|
cs.*
|
Automatic differentiation is a technique which allows a programmer to define
a numerical computation via compositions of a broad range of numeric and
computational primitives and have the underlying system support the computation
of partial derivatives of the result with respect to any of its inputs, without
making any finite difference approximations, and without manipulating large
symbolic expressions representing the computation. This note describes a novel
approach to reverse mode automatic differentiation using constraint logic
programmming, specifically, the constraint handling rules (CHR) library of SWI
Prolog, resulting in a very small (50 lines of code) implementation. When
applied to a differentiation-based implementation of the inside-outside
algorithm for parameter learning in probabilistic grammars, the CHR based
implementations outperformed two well-known frameworks for optimising
differentiable functions, Theano and TensorFlow, by a large margin.
|
cs.*
|
Tensor algebra is essential for data-intensive workloads in various
computational domains. Computational scientists face a trade-off between the
specialization degree provided by dense tensor algebra and the algorithmic
efficiency that leverages the structure provided by sparse tensors. This paper
presents StructTensor, a framework that symbolically computes structure at
compilation time. This is enabled by Structured Tensor Unified Representation
(STUR), an intermediate language that can capture tensor computations as well
as their sparsity and redundancy structures. Through a mathematical view of
lossless tensor computations, we show that our symbolic structure computation
and the related optimizations are sound. Finally, for different tensor
computation workloads and structures, we experimentally show how capturing the
symbolic structure can result in outperforming state-of-the-art frameworks for
both dense and sparse tensor algebra.
|
cs.*
|
In this paper, we propose a user-based video indexing method, that
automatically generates thumbnails of the most important scenes of an online
video stream, by analyzing users' interactions with a web video player. As a
test bench to verify our idea we have extended the YouTube video player into
the VideoSkip system. In addition, VideoSkip uses a web-database (Google
Application Engine) to keep a record of some important parameters, such as the
timing of basic user actions (play, pause, skip). Moreover, we implemented an
algorithm that selects representative thumbnails. Finally, we populated the
system with data from an experiment with nine users. We found that the
VideoSkip system indexes video content by leveraging implicit users
interactions, such as pause and thirty seconds skip. Our early findings point
toward improvements of the web video player and its thumbnail generation
technique. The VideSkip system could compliment content-based algorithms, in
order to achieve efficient video-indexing in difficult videos, such as lectures
or sports.
|
cs.*
|
This paper discusses the systematic use of product feedback information to
support life-cycle design approaches and provides guidelines for developing a
design at both the product and the system levels. Design activities are
surveyed in the light of the product life cycle, and the design information
flow is interpreted from a semiotic perspective. The natural evolution of a
design is considered, the notion of design expectations is introduced, and the
importance of evaluation of these expectations in dynamic environments is
argued. Possible strategies for reconciliation of the expectations and
environmental factors are described. An Internet-enabled technology is proposed
to monitor product functionality, usage, and operational environment and supply
the designer with relevant information. A pilot study of assessing design
expectations of a refrigerator is outlined, and conclusions are drawn.
|
cs.*
|
With the hardware support for half-precision arithmetic on NVIDIA V100 GPUs,
high-performance computing applications can benefit from lower precision at
appropriate spots to speed up the overall execution time. In this paper, we
investigate a mixed-precision geometric multigrid method to solve large sparse
systems of equations stemming from discretization of elliptic PDEs. While the
final solution is always computed with high-precision accuracy, an iterative
refinement approach with multigrid preconditioning in lower precision and
residuum scaling is employed. We compare the FP64 baseline for Poisson's
equation to purely FP16 multigrid preconditioning and to the employment of
FP16-FP32-FP64 combinations within a mesh hierarchy. While the iteration count
is almost not affected by using lower accuracy, the solver runtime is
considerably decreased due to the reduced memory transfer and a speedup of up
to 2.5x is gained for the overall solver. We investigate the performance of
selected kernels with the hierarchical Roofline model.
|
cs.*
|
Large-scale ad hoc analytics of genomic data is popular using the
R-programming language supported by 671 software packages provided by
Bioconductor. More recently, analytical jobs are benefitting from on-demand
computing and storage, their scalability and their low maintenance cost, all of
which are offered by the cloud. While Biologists and Bioinformaticists can take
an analytical job and execute it on their personal workstations, it remains
challenging to seamlessly execute the job on the cloud infrastructure without
extensive knowledge of the cloud dashboard. How analytical jobs can not only
with minimum effort be executed on the cloud, but also how both the resources
and data required by the job can be managed is explored in this paper. An
open-source light-weight framework for executing R-scripts using Bioconductor
packages, referred to as `RBioCloud', is designed and developed. RBioCloud
offers a set of simple command-line tools for managing the cloud resources, the
data and the execution of the job. Three biological test cases validate the
feasibility of RBioCloud. The framework is publicly available from
http://www.rbiocloud.com.
|
cs.*
|
The error-related potential (ErrP) is an event-related potential (ERP) evoked
by an experimental participant's recognition of an error during task
performance. ErrPs, originally described by cognitive psychologists, have been
adopted for use in brain-computer interfaces (BCIs) for the detection and
correction of errors, and the online refinement of decoding algorithms.
Riemannian geometry-based feature extraction and classification is a new
approach to BCI which shows good performance in a range of experimental
paradigms, but has yet to be applied to the classification of ErrPs. Here, we
describe an experiment that elicited ErrPs in seven normal participants
performing a visual discrimination task. Audio feedback was provided on each
trial. We used multi-channel electroencephalogram (EEG) recordings to classify
ErrPs (success/failure), comparing a Riemannian geometry-based method to a
traditional approach that computes time-point features. Overall, the Riemannian
approach outperformed the traditional approach (78.2% versus 75.9% accuracy, p
< 0.05); this difference was statistically significant (p < 0.05) in three of
seven participants. These results indicate that the Riemannian approach better
captured the features from feedback-elicited ErrPs, and may have application in
BCI for error detection and correction.
|
cs.*
|
Estonia has a global reputation of a digital state or e-country. However,
despite the success in digital governance, the country has faced challenges in
the realm of Open Government Data (OGD) area, with significant advancements in
its OGD ecosystem, as reflected in various open data rankings from 2020 and
onwards, in the recent years being recognized among trend-setters. This paper
aims to explore the evolution and positioning of Estonia's OGD development,
encompassing national and local levels, through an integrated analysis of
various indices, primary data from the Estonian OGD portal, and a thorough
literature review. The research shows that Estonia has made progress in the
national level open data ecosystem, primarily due to improvements in the OGD
portal usability and legislation amendments. However, the local level is not as
developed, with local governments lagging behind in OGD provision. The
literature review highlights the lack of previous research focusing on Estonian
and European local open data, emphasizing the need for future studies to
explore the barriers and enablers of municipal OGD. This study contributes to a
nuanced understanding of Estonia's dynamic journey in the OGD landscape,
shedding light on both achievements and areas warranting further attention for
establishing a sustainable open data ecosystem.
|
cs.*
|
We study the boundedness problem for unions of conjunctive regular path
queries with inverses (UC2RPQs). This is the problem of, given a UC2RPQ,
checking whether it is equivalent to a union of conjunctive queries (UCQ). We
show the problem to be ExpSpace-complete, thus coinciding with the complexity
of containment for UC2RPQs. As a corollary, when a UC2RPQ is bounded, it is
equivalent to a UCQ of at most triple-exponential size, and in fact we show
that this bound is optimal. We also study better behaved classes of UC2RPQs,
namely acyclic UC2RPQs of bounded thickness, and strongly connected UCRPQs,
whose boundedness problem are, respectively, PSpace-complete and
$\Pi^p_2$-complete. Most upper bounds exploit results on limitedness for
distance automata, in particular extending the model with alternation and
two-wayness, which may be of independent interest.
|
cs.*
|
A graph database is a digraph whose arcs are labeled with symbols from a
fixed alphabet. A regular graph pattern (RGP) is a digraph whose edges are
labeled with regular expressions over the alphabet. RGPs model navigational
queries for graph databases called conjunctive regular path queries (CRPQs). A
match of a CRPQ in the database is witnessed by a special navigational
homomorphism of the corresponding RGP to the database. We study the complexity
of deciding the existence of a homomorphism between two RGPs. Such
homomorphisms model a strong type of containment between the two corresponding
CRPQs. We show that this problem can be solved by an EXPTIME algorithm (while
general query containmement in this context is EXPSPACE-complete). We also
study the problem for restricted RGPs over a unary alphabet, that arise from
some applications like XPath or SPARQL. For this case, homomorphism-based CRPQ
containment is in NP. We prove that certain interesting cases are in fact
polynomial-time solvable.
|
cs.*
|
During the last decade, Machine Learning (ML) has increasingly become a hot
topic in the field of Computer Networks and is expected to be gradually adopted
for a plethora of control, monitoring and management tasks in real-world
deployments. This poses the need to count on new generations of students,
researchers and practitioners with a solid background in ML applied to
networks. During 2020, the International Telecommunication Union (ITU) has
organized the "ITU AI/ML in 5G challenge'', an open global competition that has
introduced to a broad audience some of the current main challenges in ML for
networks. This large-scale initiative has gathered 23 different challenges
proposed by network operators, equipment manufacturers and academia, and has
attracted a total of 1300+ participants from 60+ countries. This paper narrates
our experience organizing one of the proposed challenges: the "Graph Neural
Networking Challenge 2020''. We describe the problem presented to participants,
the tools and resources provided, some organization aspects and participation
statistics, an outline of the top-3 awarded solutions, and a summary with some
lessons learned during all this journey. As a result, this challenge leaves a
curated set of educational resources openly available to anyone interested in
the topic.
|
cs.*
|
Asthma is a common, usually long-term respiratory disease with negative
impact on global society and economy. Treatment involves using medical devices
(inhalers) that distribute medication to the airways and its efficiency depends
on the precision of the inhalation technique. There is a clinical need for
objective methods to assess the inhalation technique, during clinical
consultation. Integrated health monitoring systems, equipped with sensors,
enable the recognition of drug actuation, embedded with sound signal detection,
analysis and identification, from intelligent structures, that could provide
powerful tools for reliable content management. Health monitoring systems
equipped with sensors, embedded with sound signal detection, enable the
recognition of drug actuation and could be used for effective audio content
analysis. This paper revisits sound pattern recognition with machine learning
techniques for asthma medication adherence assessment and presents the
Respiratory and Drug Actuation (RDA) Suite
(https://gitlab.com/vvr/monitoring-medication-adherence/rda-benchmark) for
benchmarking and further research. The RDA Suite includes a set of tools for
audio processing, feature extraction and classification procedures and is
provided along with a dataset, consisting of respiratory and drug actuation
sounds. The classification models in RDA are implemented based on conventional
and advanced machine learning and deep networks' architectures. This study
provides a comparative evaluation of the implemented approaches, examines
potential improvements and discusses on challenges and future tendencies.
|
cs.*
|
This paper gives a survey of related work on the information visualization
domain and study the real integration of the cartography paradigms in actual
information search systems. Based on this study, we propose a semantic
visualization and navigation approach which offer to users three search modes:
precise search, connotative search and thematic search. The objective is to
propose to the users of an information search system, new interaction paradigms
which support the semantic aspect of the considered information space and guide
users in their searches by assisting them to locate their interest center and
to improve serendipity.
|
cs.*
|
The question of encoding movements such as those produced by human gestures
may become central in the coming years, given the growing importance of
movement data exchanges between heterogeneous systems and applications (musical
applications, 3D motion control, virtual reality interaction, etc.). For the
past 20 years, various formats have been proposed for encoding movement,
especially gestures. Though, these formats, at different degrees, were designed
in the context of quite specific applications (character animation, motion
capture, musical gesture, biomechanical concerns...). The article introduce a
new file format, called GMS (for 'Gesture and Motion Signal'), with the aim of
being more low-level and generic, by defining the minimal features a format
carrying movement/gesture information needs, rather than by gathering all the
information generally given by the existing formats. The article argues that,
given its growing presence in virtual reality situations, the "gesture signal"
itself must be encoded, and that a specific format is needed. The proposed
format features the inner properties of such signals: dimensionality,
structural features, types of variables, and spatial and temporal properties.
The article first reviews the various situations with multisensory virtual
objects in which gesture controls intervene. The proposed format is then
deduced, as a mean to encode such versatile and variable "gestural and animated
scene".
|
cs.*
|
Architects and systems designers artfully balance multiple competing design
constraints during the design process but are unable to translate between
system metrics and end user experience. This work presents three methodologies
to fill in this gap. The first is an incentive-compatible methodology that
determines a "ground truth" measurement of users' value of speed in terms of US
dollars, and find that users would accept a performance losses of 10%, 20%, and
30% to their personal computer in exchange for \$2.27, \$4.07, and \$4.43 per
day, respectively. However, while highly accurate the methodology is a
painstaking process and does not scale with large numbers of participants. To
allow for scalability, we introduce a second methodology -- a lab-based
simulation experiment -- which finds that users would accept a permanent
performance loss of 10%, 20%, and 30% to their personal computer in exchange
for \$127, \$169, and \$823, respectively. Finally, to allow for even greater
scalability, we introduce a third methodology -- a survey -- and observe that
the lack of incentive compatibility and the lack of hands-on experience with
throttled device performance skews the results significantly, thus
demonstrating the need for lab-based or incentive compatible study designs. By
quantifying the tradeoff between user satisfaction and performance, we enable
architects and systems designers to make more nuanced tradeoffs between design
requirements.
|
cs.*
|
Due to the lack of budget, competence, personnel and time, small museums are
often unable to develop compelling, educational and accessible web resources
for their permanent collections or temporary exhibitions. In an attempt to
prove that investing in these types of resources can be very fruitful even for
small institutions, we will illustrate the case of Accademia Carrara, a museum
in Bergamo, northern Italy, which, for a current temporary exhibition on
Cezanne and Renoir's masterpieces from the Paul Guillaume collection, developed
a series of multimedia applications, including an accessible website, rich in
content and educational material [www.cezannerenoir.it].
|
cs.*
|
The increasing availability of temporal data poses a challenge to time-series
and signal-processing domains due to its high numerosity and complexity.
Symbolic representation outperforms raw data in a variety of engineering
applications due to its storage efficiency, reduced numerosity, and noise
reduction. The most recent symbolic aggregate approximation technique called
ABBA demonstrates outstanding performance in preserving essential shape
information of time series and enhancing the downstream applications. However,
ABBA cannot handle multiple time series with consistent symbols, i.e., the same
symbols from distinct time series are not identical. Also, working with
appropriate ABBA digitization involves the tedious task of tuning the
hyperparameters, such as the number of symbols or tolerance. Therefore, we
present a joint symbolic aggregate approximation that has symbolic consistency,
and show how the hyperparameter of digitization can itself be optimized
alongside the compression tolerance ahead of time. Besides, we propose a novel
computing paradigm that enables parallel computing of symbolic approximation.
The extensive experiments demonstrate its superb performance and outstanding
speed regarding symbolic approximation and reconstruction.
|
cs.*
|
Humor is an inherently social phenomenon, with humorous utterances shaped by
what is socially and culturally accepted. Understanding humor is an important
NLP challenge, with many applications to human-computer interactions. In this
work we explore humor in the context of Cards Against Humanity -- a party game
where players complete fill-in-the-blank statements using cards that can be
offensive or politically incorrect. We introduce a novel dataset of 300,000
online games of Cards Against Humanity, including 785K unique jokes, analyze it
and provide insights. We trained machine learning models to predict the winning
joke per game, achieving performance twice as good (20\%) as random, even
without any user information. On the more difficult task of judging novel
cards, we see the models' ability to generalize is moderate. Interestingly, we
find that our models are primarily focused on punchline card, with the context
having little impact. Analyzing feature importance, we observe that short,
crude, juvenile punchlines tend to win.
|
cs.*
|
Minimal problems in computer vision raise the demand of generating efficient
automatic solvers for polynomial equation systems. Given a polynomial system
repeated with different coefficient instances, the traditional Gr\"obner basis
or normal form based solution is very inefficient. Fortunately the Gr\"obner
basis of a same polynomial system with different coefficients is found to share
consistent inner structure. By precomputing such structures offline, Gr\"obner
basis as well as the polynomial system solutions can be solved automatically
and efficiently online. In the past decade, several tools have been released to
generate automatic solvers for a general minimal problems. The most recent tool
autogen from Larsson et al. is a representative of these tools with
state-of-the-art performance in solver efficiency. GAPS wraps and improves
autogen with more user-friendly interface, more functionality and better
stability. We demonstrate in this report the main approach and enhancement
features of GAPS. A short tutorial of the software is also included.
|
cs.*
|
Several distinct techniques have been proposed to design quasi-polynomial
algorithms for solving parity games since the breakthrough result of Calude,
Jain, Khoussainov, Li, and Stephan (2017): play summaries, progress measures
and register games. We argue that all those techniques can be viewed as
instances of the separation approach to solving parity games, a key technical
component of which is constructing (explicitly or implicitly) an automaton that
separates languages of words encoding plays that are (decisively) won by either
of the two players. Our main technical result is a quasi-polynomial lower bound
on the size of such separating automata that nearly matches the current best
upper bounds. This forms a barrier that all existing approaches must overcome
in the ongoing quest for a polynomial-time algorithm for solving parity games.
The key and fundamental concept that we introduce and study is a universal
ordered tree. The technical highlights are a quasi-polynomial lower bound on
the size of universal ordered trees and a proof that every separating safety
automaton has a universal tree hidden in its state space.
|
cs.*
|
Games on recursive game graphs can be used to reason about the control flow
of sequential programs with recursion. In games over recursive game graphs, the
most natural notion of strategy is the modular strategy, i.e., a strategy that
is local to a module and is oblivious to previous module invocations, and thus
does not depend on the context of invocation. In this work, we study for the
first time modular strategies with respect to winning conditions that can be
expressed by a pushdown automaton.
We show that such games are undecidable in general, and become decidable for
visibly pushdown automata specifications.
Our solution relies on a reduction to modular games with finite-state
automata winning conditions, which are known in the literature.
We carefully characterize the computational complexity of the considered
decision problem. In particular, we show that modular games with a universal
Buchi or co Buchi visibly pushdown winning condition are EXPTIME-complete, and
when the winning condition is given by a CARET or NWTL temporal logic formula
the problem is 2EXPTIME-complete, and it remains 2EXPTIME-hard even for simple
fragments of these logics.
As a further contribution, we present a different solution for modular games
with finite-state automata winning condition that runs faster than known
solutions for large specifications and many exits.
|
cs.*
|
We investigate algorithmic control of a large swarm of mobile particles (such
as robots, sensors, or building material) that move in a 2D workspace using a
global input signal (such as gravity or a magnetic field). We show that a maze
of obstacles to the environment can be used to create complex systems. We
provide a wide range of results for a wide range of questions. These can be
subdivided into external algorithmic problems, in which particle configurations
serve as input for computations that are performed elsewhere, and internal
logic problems, in which the particle configurations themselves are used for
carrying out computations. For external algorithms, we give both negative and
positive results. If we are given a set of stationary obstacles, we prove that
it is NP-hard to decide whether a given initial configuration of unit-sized
particles can be transformed into a desired target configuration. Moreover, we
show that finding a control sequence of minimum length is PSPACE-complete. We
also work on the inverse problem, providing constructive algorithms to design
workspaces that efficiently implement arbitrary permutations between different
configurations. For internal logic, we investigate how arbitrary computations
can be implemented. We demonstrate how to encode dual-rail logic to build a
universal logic gate that concurrently evaluates and, nand, nor, and or
operations. Using many of these gates and appropriate interconnects, we can
evaluate any logical expression. However, we establish that simulating the full
range of complex interactions present in arbitrary digital circuits encounters
a fundamental difficulty: a fan-out gate cannot be generated. We resolve this
missing component with the help of 2x1 particles, which can create fan-out
gates that produce multiple copies of the inputs. Using these gates we provide
rules for replicating arbitrary digital circuits.
|
cs.*
|
This is the arXiv index for the electronic proceedings of GD 2023, which
contains the peer-reviewed and revised accepted papers with an optional
appendix. Proceedings (without appendices) are also to be published by Springer
in the Lecture Notes in Computer Science series.
|
cs.*
|
The challenging deployment of compute-intensive applications from domains
such Artificial Intelligence (AI) and Digital Signal Processing (DSP), forces
the community of computing systems to explore new design approaches.
Approximate Computing appears as an emerging solution, allowing to tune the
quality of results in the design of a system in order to improve the energy
efficiency and/or performance. This radical paradigm shift has attracted
interest from both academia and industry, resulting in significant research on
approximation techniques and methodologies at different design layers (from
system down to integrated circuits). Motivated by the wide appeal of
Approximate Computing over the last 10 years, we conduct a two-part survey to
cover key aspects (e.g., terminology and applications) and review the
state-of-the art approximation techniques from all layers of the traditional
computing stack. In Part II of our survey, we classify and present the
technical details of application-specific and architectural approximation
techniques, which both target the design of resource-efficient
processors/accelerators & systems. Moreover, we present a detailed analysis of
the application spectrum of Approximate Computing and discuss open challenges
and future directions.
|
cs.*
|
Solving avoidability problems in the area of string combinatorics often
requires, in an initial step, the construction, via a computer program, of a
very long word that does not contain any word that matches a given pattern. It
is well known that this is a computationally hard task. Despite being rather
straightforward that, ultimately, all such tasks can be formalized as
constraints satisfaction problems, no unified approach to solving them was
proposed so far, and very diverse ad-hoc methods were used. We aim to fill this
gap: we show how several relevant avoidability problems can be modelled, and
consequently solved, in an uniform way as constraint satisfaction problems,
using the framework of MiniZinc. The main advantage of this approach is that
one is now required only to formulate the avoidability problem in the MiniZinc
language, and then the actual search for a solution does not have to be
implemented ad-hoc, being instead carried out by a standard CSP-solver.
|
cs.*
|
We review some results regarding specification, programming and verification
of different classes of distributed systems which stemmed from the research of
the Concurrency and Mobility Group at University of Firenze. More specifically,
we examine the distinguishing features of network-aware programming,
service-oriented computing, autonomic computing, and collective adaptive
systems programming. We then present an overview of four different languages,
namely Klaim, Cows, Scel and AbC. For each language, we discuss design choices,
present syntax and semantics, show how the different formalisms can be used to
model and program a travel booking scenario, and describe programming
environments and verification techniques.
|
cs.*
|
This paper extends our Real-Time Maude formalization of the semantics of flat
Ptolemy II discrete-event (DE) models to hierarchical models, including modal
models. This is a challenging task that requires combining synchronous
fixed-point computations with hierarchical structure. The synthesis of a
Real-Time Maude verification model from a Ptolemy II DE model, and the formal
verification of the synthesized model in Real-Time Maude, have been integrated
into Ptolemy II, enabling a model-engineering process that combines the
convenience of Ptolemy II DE modeling and simulation with formal verification
in Real-Time Maude.
|
cs.*
|
We investigate the decidability of automatic program verification for
programs that manipulate heaps, and in particular, decision procedures for
proving memory safety for them. We extend recent work that identified a
decidable subclass of uninterpreted programs to a class of alias-aware programs
that can update maps. We apply this theory to develop verification algorithms
for memory safety--- determining if a heap-manipulating program that allocates
and frees memory locations and manipulates heap pointers does not dereference
an unallocated memory location. We show that this problem is decidable when the
initial allocated heap forms a forest data-structure and when programs are
streaming-coherent, which intuitively restricts programs to make a single pass
over a data-structure. Our experimental evaluation on a set of library routines
that manipulate forest data-structures shows that common single-pass algorithms
on data-structures often fall in the decidable class, and that our decision
procedure is efficient in verifying them.
|
cs.*
|
Many modern parallel computing systems are heterogeneous at their node level.
Such nodes may comprise general purpose CPUs and accelerators (such as, GPU, or
Intel Xeon Phi) that provide high performance with suitable energy-consumption
characteristics. However, exploiting the available performance of heterogeneous
architectures may be challenging. There are various parallel programming
frameworks (such as, OpenMP, OpenCL, OpenACC, CUDA) and selecting the one that
is suitable for a target context is not straightforward.
In this paper, we study empirically the characteristics of OpenMP, OpenACC,
OpenCL, and CUDA with respect to programming productivity, performance, and
energy. To evaluate the programming productivity we use our homegrown tool
CodeStat, which enables us to determine the percentage of code lines that was
required to parallelize the code using a specific framework. We use our tool
x-MeterPU to evaluate the energy consumption and the performance. Experiments
are conducted using the industry-standard SPEC benchmark suite and the Rodinia
benchmark suite for accelerated computing on heterogeneous systems that combine
Intel Xeon E5 Processors with a GPU accelerator or an Intel Xeon Phi
co-processor.
|
cs.*
|
The Logical Execution Time (LET) programming model has recently received
considerable attention, particularly because of its timing and dataflow
determinism. In LET, task computation appears always to take the same amount of
time (called the task's LET interval), and the task reads (resp. writes) at the
beginning (resp. end) of the interval. Compared to other communication
mechanisms, such as implicit communication and Dynamic Buffer Protocol (DBP),
LET performs worse on many metrics, such as end-to-end latency (including
reaction time and data age) and time disparity jitter. Compared with the
default LET setting, the flexible LET (fLET) model shrinks the LET interval
while still guaranteeing schedulability by introducing the virtual offset to
defer the read operation and using the virtual deadline to move up the write
operation. Therefore, fLET has the potential to significantly improve the
end-to-end timing performance while keeping the benefits of deterministic
behavior on timing and dataflow.
To fully realize the potential of fLET, we consider the problem of optimizing
the assignments of its virtual offsets and deadlines. We propose new
abstractions to describe the task communication pattern and new optimization
algorithms to explore the solution space efficiently. The algorithms leverage
the linearizability of communication patterns and utilize symbolic operations
to achieve efficient optimization while providing a theoretical guarantee. The
framework supports optimizing multiple performance metrics and guarantees
bounded suboptimality when optimizing end-to-end latency. Experimental results
show that our optimization algorithms improve upon the default LET and its
existing extensions and significantly outperform implicit communication and DBP
in terms of various metrics, such as end-to-end latency, time disparity, and
its jitter.
|
cs.*
|
A distributed algorithm is self-stabilizing if after faults and attacks hit
the system and place it in some arbitrary global state, the system recovers
from this catastrophic situation without external intervention in finite time.
In this paper, we consider the problem of constructing self-stabilizingly a
\emph{maximal independent set} in uniform unidirectional networks of arbitrary
shape. On the negative side, we present evidence that in uniform networks,
\emph{deterministic} self-stabilization of this problem is \emph{impossible}.
Also, the \emph{silence} property (\emph{i.e.} having communication fixed from
some point in every execution) is impossible to guarantee, either for
deterministic or for probabilistic variants of protocols. On the positive side,
we present a deterministic protocol for networks with arbitrary unidirectional
networks with unique identifiers that exhibits polynomial space and time
complexity in asynchronous scheduling. We complement the study with
probabilistic protocols for the uniform case: the first probabilistic protocol
requires infinite memory but copes with asynchronous scheduling, while the
second probabilistic protocol has polynomial space complexity but can only
handle synchronous scheduling. Both probabilistic solutions have expected
polynomial time complexity.
|
cs.*
|
We introduce a simple network formation model for social networks. Agents are
nodes, connecting to another agent by building a directed edge (or accepting a
connection from another agent) has a cost, and reaching (or being reached by)
other agents via short directed paths has a benefit; in effect, an agent wants
to reach others quickly, but without the cost of directly connecting each and
every one. We prove that asynchronous edge dynamics always converge to a stable
network; in fact, for nontrivial ranges of parameters this convergence is fast.
Moreover, the set of fixed points of the dynamics form a nontrivial class of
networks. For the static game, we give classes of efficient networks for
nontrivial parameter ranges and further study their stability. We close several
problems, and leave many interesting ones open.
|
cs.*
|
Stochastic multiplayer games (SMGs) have gained attention in the field of
strategy synthesis for multi-agent reactive systems. However, standard SMGs are
limited to modeling systems where all agents have full knowledge of the state
of the game. In this paper, we introduce delayed-action games (DAGs) formalism
that simulates hidden-information games (HIGs) as SMGs, where hidden
information is captured by delaying a player's actions. The elimination of
private variables enables the usage of SMG off-the-shelf model checkers to
implement HIGs. Furthermore, we demonstrate how a DAG can be decomposed into
subgames that can be independently explored, utilizing parallel computation to
reduce the model checking time, while alleviating the state space explosion
problem that SMGs are notorious for. In addition, we propose a DAG-based
framework for strategy synthesis and analysis. Finally, we demonstrate
applicability of the DAG-based synthesis framework on a case study of a
human-on-the-loop unmanned-aerial vehicle system under stealthy attacks, where
the proposed framework is used to formally model, analyze and synthesize
security-aware strategies for the system.
|
cs.*
|
A regular path query (RPQ) is a regular expression q that returns all node
pairs (u, v) from a graph database that are connected by an arbitrary path
labelled with a word from L(q). The obvious algorithmic approach to
RPQ-evaluation (called PG-approach), i.e., constructing the product graph
between an NFA for q and the graph database, is appealing due to its simplicity
and also leads to efficient algorithms. However, it is unclear whether the
PG-approach is optimal. We address this question by thoroughly investigating
which upper complexity bounds can be achieved by the PG-approach, and we
complement these with conditional lower bounds (in the sense of the
fine-grained complexity framework). A special focus is put on enumeration and
delay bounds, as well as the data complexity perspective. A main insight is
that we can achieve optimal (or near optimal) algorithms with the PG-approach,
but the delay for enumeration is rather high (linear in the database). We
explore three successful approaches towards enumeration with sub-linear delay:
super-linear preprocessing, approximations of the solution sets, and restricted
classes of RPQs.
|
cs.*
|
Purposely modular, this protocol enables customization of several protocol
properties, including the consensus properties implemented, blockchain type,
the roots used, and virtual machine opcodes, among others. These modules enable
implementing parties to control the behavior of their economy, with a minimal
amount of effort, and no sacrifice in participant cryptoeconomic quality. This
work also demonstrates the simplification of the developer experience by
abstracting away all technological details, except basic CRUD-based operations,
using various programming languages. We demonstrate the mechanism design
approach taken, and formalize a process for deploying populations of blockchain
economies at scale. The framework shown includes adequate tooling for
simulation, development, deployment, maintenance, and analytic-based decision
making. Lastly, we introduce an expressive programming language for the purpose
of creating, and interacting with the cryptoeconomy designed by the
implementing developer.
|
cs.*
|
Time awareness is critical to a broad range of emerging applications -- in
Cyber-Physical Systems and Internet of Things -- running on commodity platforms
and operating systems. Traditionally, time is synchronized across devices
through a best-effort background service whose performance is neither
observable nor controllable, thus consuming system resources independently of
application needs while not allowing the applications and OS services to adapt
to changes in uncertainty in system time. We advocate for rethinking how time
is managed in a system stack. In this paper, we propose a new clock model that
characterizes various sources of timing uncertainties in true time. We then
present a Kalman filter based time synchronization protocol that adapts to the
uncertainties exposed by the clock model. Our realization of a
uncertainty-aware clock model and synchronization protocol is based on a
standard embedded Linux platform.
|
cs.*
|
Within the field of biocybersecurity, it is important to understand what
vulnerabilities may be uncovered in the processing of biologics as well as how
they can be safeguarded as they intersect with cyber and cyberphysical systems,
as noted by the Peccoud Lab, to ensure not only product and brand integrity,
but protect those served. Recent findings have revealed that biological systems
can be used to compromise computer systems and vice versa. While regular and
sophisticated attacks are still years away, time is of the essence to better
understand ways to deepen critique and grasp intersectional vulnerabilities
within bioprocessing as processes involved become increasingly digitally
accessible. Wargames have been shown to be successful with-in improving group
dynamics in response to anticipated cyber threats, and they can be used towards
addressing possible threats within biocybersecurity. Within this paper, we
discuss the growing prominence of biocybersecurity, the importance of
biocybersecurity to bioprocessing , with respect to domestic and international
contexts, and reasons for emphasizing the biological component in the face of
explosive growth in biotechnology and thus separating the terms
biocybersecurity and cyberbiosecurity. Additionally, a discussion and manual is
provided for a simulation towards organizational learning to sense and shore up
vulnerabilities that may emerge within an organization's bioprocessing pipeline
|
cs.*
|
The mystery about the ingenious creator of Bitcoin concealing behind the
pseudonym Satoshi Nakamoto has been fascinating the global public for more than
a decade. Suddenly jumping out of the dark in 2008, this persona hurled the
decentralized electronic cash system "Bitcoin", which has reached a peak market
capitalization in the region of 1 trillion USD. In a purposely agnostic, and
meticulous "lea-ving no stone unturned" approach, this study presents new hard
facts, which evidently slipped through Satoshi Nakamoto's elaborate privacy
shield, and derives meaningful pointers that are primarily inferred from
Bitcoin's whitepaper, its blockchain parameters, and data that were widely up
to his discretion. This ample stack of established and novel evidence is
systematically categorized, analyzed, and then connected to its related,
real-world ambient, like relevant locations and happenings in the past, and at
the time. Evidence compounds towards a substantial role of the Benelux
cryptography ecosystem, with strong transatlantic links, in the creation of
Bitcoin. A consistent biography, a psychogram, and gripping story of an
ingenious, multi-talented, autodidactic, reticent, and capricious polymath
transpire, which are absolutely unique from a history of science and technology
perspective. A cohort of previously fielded and best matches emerging from the
investigations are probed against an unprecedently restrictive, multi-stage
exclusion filter, which can, with maximum certainty, rule out most "Satoshi
Nakamoto" candidates, while some of them remain to be confirmed. With this
article, you will be able to decide who is not, or highly unlikely to be
Satoshi Nakamoto, be equipped with an ample stack of systematically categorized
evidence and efficient methodologies to find suitable candidates, and can
possibly unveil the real identity of the creator of Bitcoin - if you want.
|
cs.*
|
We present VMap, a map-like rectangular space-filling visualization, to
perform vertex-centric graph exploration. Existing visualizations have limited
support for quality optimization among rectangular aspect ratios, vertex-edge
intersection, and data encoding accuracy. To tackle this problem, VMap
integrates three novel components: (1) a desired-aspect-ratio (DAR) rectangular
partitioning algorithm, (2) a two-stage rectangle adjustment algorithm, and (3)
a simulated annealing based heuristic optimizer. First, to generate a
rectangular space-filling layout of an input graph, we subdivide the 2D
embedding of the graph into rectangles with optimization of rectangles' aspect
ratios toward a desired aspect ratio. Second, to route graph edges between
rectangles without vertex-edge occlusion, we devise a two-stage algorithm to
adjust a rectangular layout to insert border space between rectangles. Third,
to produce and arrange rectangles by considering multiple visual criteria, we
design a simulated annealing based heuristic optimization to adjust vertices'
2D embedding to support trade-offs among aspect ratio quality and the encoding
accuracy of vertices' weights and adjacency. We evaluated the effectiveness of
VMap on both synthetic and application datasets. The resulting rectangular
layout has better aspect ratio quality on synthetic data compared with the
existing method for the rectangular partitioning of 2D points. On three
real-world datasets, VMap achieved better encoding accuracy and attained faster
generation speed compared with existing methods on graphs' rectangular layout
generation. We further illustrate the usefulness of VMap for vertex-centric
graph exploration through three case studies on visualizing social networks,
representing academic communities, and displaying geographic information.
|
cs.*
|
This paper analyses the application of no-reference metric NIQE to the task
of video-codec comparison. A number of issues in the metric behaviour on videos
was detected and described. The metric has outlying scores on black and
solid-coloured frames. The proposed averaging technique for metric quality
scores helped to improve the results in some cases. Also, NIQE has low-quality
scores for videos with detailed textures and higher scores for videos of lower
bitrates due to the blurring of these textures after compression. Although NIQE
showed natural results for many tested videos, it is not universal and
currently can not be used for video-codec comparisons.
|
cs.*
|
Traditional load balancers used in server clusters have problems such as lack
of flexibility, high cost, etc. To overcome these problems, research has been
conducted to apply a load balancer using software-defined network (SDN) to the
server cluster. Under this trend, in this paper, we proposed a hybrid load
balancing method with failover capability in the server cluster using SDN. The
main goal of this paper is to improve the performance and failover capability
of load balancing. First, we improved the performance of the dynamic weighted
random selection (DWRS) algorithm by adopting the binary search to find the
target server. Next, we proposed a dynamic method with failover capability by
combining the improved DWRS algorithm with a fast-failover (FF) group table. In
addition, a hybrid method combining the static method using the SELECT group
table and the dynamic method with failover capability is proposed to improve
the performance. Finally, the failover capability and performance of the
proposed method are evaluated in an experimental environment.
|
cs.*
|
The VEDLIoT project targets the development of energy-efficient Deep Learning
for distributed AIoT applications. A holistic approach is used to optimize
algorithms while also dealing with safety and security challenges. The approach
is based on a modular and scalable cognitive IoT hardware platform. Using
modular microserver technology enables the user to configure the hardware to
satisfy a wide range of applications. VEDLIoT offers a complete design flow for
Next-Generation IoT devices required for collaboratively solving complex Deep
Learning applications across distributed systems. The methods are tested on
various use-cases ranging from Smart Home to Automotive and Industrial IoT
appliances. VEDLIoT is an H2020 EU project which started in November 2020. It
is currently in an intermediate stage with the first results available.
|
cs.*
|
Homomorphic Encryption (HE) enables users to securely outsource both the
storage and computation of sensitive data to untrusted servers. Not only does
HE offer an attractive solution for security in cloud systems, but
lattice-based HE systems are also believed to be resistant to attacks by
quantum computers. However, current HE implementations suffer from
prohibitively high latency. For lattice-based HE to become viable for
real-world systems, it is necessary for the key bottlenecks - particularly
polynomial multiplication - to be highly efficient.
In this paper, we present a characterization of GPU-based implementations of
polynomial multiplication. We begin with a survey of modular reduction
techniques and analyze several variants of the widely-used Barrett modular
reduction algorithm. We then propose a modular reduction variant optimized for
64-bit integer words on the GPU, obtaining a 1.8x speedup over the existing
comparable implementations. Next, we explore the following GPU-specific
improvements for polynomial multiplication targeted at optimizing latency and
throughput: 1) We present a 2D mixed-radix, multi-block implementation of NTT
that results in a 1.85x average speedup over the previous state-of-the-art. 2)
We explore shared memory optimizations aimed at reducing redundant memory
accesses, further improving speedups by 1.2x. 3) Finally, we fuse the Hadamard
product with neighboring stages of the NTT, reducing the twiddle factor memory
footprint by 50%. By combining our NTT optimizations, we achieve an overall
speedup of 123.13x and 2.37x over the previous state-of-the-art CPU and GPU
implementations of NTT kernels, respectively.
|
cs.*
|
Secure computation is of critical importance to not only the DoD, but across
financial institutions, healthcare, and anywhere personally identifiable
information (PII) is accessed. Traditional security techniques require data to
be decrypted before performing any computation. When processed on untrusted
systems the decrypted data is vulnerable to attacks to extract the sensitive
information. To address these vulnerabilities Fully Homomorphic Encryption
(FHE) keeps the data encrypted during computation and secures the results, even
in these untrusted environments. However, FHE requires a significant amount of
computation to perform equivalent unencrypted operations. To be useful, FHE
must significantly close the computation gap (within 10x) to make encrypted
processing practical. To accomplish this ambitious goal the TREBUCHET project
is leading research and development in FHE processing hardware to accelerate
deep computations on encrypted data, as part of the DARPA MTO Data Privacy for
Virtual Environments (DPRIVE) program. We accelerate the major secure
standardized FHE schemes (BGV, BFV, CKKS, FHEW, etc.) at >=128-bit security
while integrating with the open-source PALISADE and OpenFHE libraries currently
used in the DoD and in industry. We utilize a novel tile-based chip design with
highly parallel ALUs optimized for vectorized 128b modulo arithmetic. The
TREBUCHET coprocessor design provides a highly modular, flexible, and
extensible FHE accelerator for easy reconfiguration, deployment, integration
and application on other hardware form factors, such as System-on-Chip or
alternate chip areas.
|
cs.*
|
We introduce a search problem called ``mutual search'' where $k$ \agents,
arbitrarily distributed over $n$ sites, are required to locate one another by
posing queries of the form ``Anybody at site $i$?''. We ask for the least
number of queries that is necessary and sufficient. For the case of two \agents
using deterministic protocols we obtain the following worst-case results: In an
oblivious setting (where all pre-planned queries are executed) there is no
savings: $n-1$ queries are required and are sufficient. In a nonoblivious
setting we can exploit the paradigm of ``no news is also news'' to obtain
significant savings: in the synchronous case $0.586n$ queries suffice and
$0.536n$ queries are required; in the asynchronous case $0.896n$ queries
suffice and a fortiori 0.536 queries are required; for $o(\sqrt{n})$ \agents
using a deterministic protocol less than $n$ queries suffice; there is a simple
randomized protocol for two \agents with worst-case expected $0.5n$ queries and
all randomized protocols require at least $0.125n$ worst-case expected queries.
The graph-theoretic framework we formulate for expressing and analyzing
algorithms for this problem may be of independent interest.
|
cs.*
|
A cost Markov chain is a Markov chain whose transitions are labelled with
non-negative integer costs. A fundamental problem on this model, with
applications in the verification of stochastic systems, is to compute
information about the distribution of the total cost accumulated in a run. This
includes the probability of large total costs, the median cost, and other
quantiles. While expectations can be computed in polynomial time, previous work
has demonstrated that the computation of cost quantiles is harder but can be
done in PSPACE. In this paper we show that cost quantiles in cost Markov chains
can be computed in the counting hierarchy, thus providing evidence that
computing those quantiles is likely not PSPACE-hard. We obtain this result by
exhibiting a tight link to a problem in formal language theory: counting the
number of words that are both accepted by a given automaton and have a given
Parikh image. Motivated by this link, we comprehensively investigate the
complexity of the latter problem. Among other techniques, we rely on the
so-called BEST theorem for efficiently computing the number of Eulerian
circuits in a directed graph.
|
cs.*
|
We give in this paper a logical characterization for unambiguous Context Free
Languages, in the vein of descriptive complexity. A fragment of the logic
characterizing context free languages given by Lautemann, Schwentick and
Th\'erien [18] based on implicit definability is used for this aim. We obtain a
new connection between two undecidable problems, a logical one and a language
theoretical one.
|
cs.*
|
The program-over-monoid model of computation originates with Barrington's
proof that the model captures the complexity class $\mathsf{NC^1}$. Here we
make progress in understanding the subtleties of the model. First, we identify
a new tameness condition on a class of monoids that entails a natural
characterization of the regular languages recognizable by programs over monoids
from the class. Second, we prove that the class known as $\mathbf{DA}$
satisfies tameness and hence that the regular languages recognized by programs
over monoids in $\mathbf{DA}$ are precisely those recognizable in the classical
sense by morphisms from $\mathbf{QDA}$. Third, we show by contrast that the
well studied class of monoids called $\mathbf{J}$ is not tame. Finally, we
exhibit a program-length-based hierarchy within the class of languages
recognized by programs over monoids from $\mathbf{DA}$.
|
cs.*
|
An ever increasing number of configuration parameters are provided to system
users. But many users have used one configuration setting across different
workloads, leaving untapped the performance potential of systems. A good
configuration setting can greatly improve the performance of a deployed system
under certain workloads. But with tens or hundreds of parameters, it becomes a
highly costly task to decide which configuration setting leads to the best
performance. While such task requires the strong expertise in both the system
and the application, users commonly lack such expertise.
To help users tap the performance potential of systems, we present
BestConfig, a system for automatically finding a best configuration setting
within a resource limit for a deployed system under a given application
workload. BestConfig is designed with an extensible architecture to automate
the configuration tuning for general systems. To tune system configurations
within a resource limit, we propose the divide-and-diverge sampling method and
the recursive bound-and-search algorithm. BestConfig can improve the throughput
of Tomcat by 75%, that of Cassandra by 63%, that of MySQL by 430%, and reduce
the running time of Hive join job by about 50% and that of Spark join job by
about 80%, solely by configuration adjustment.
|
cs.*
|
We study the parameterized complexity of evaluating Ontology Mediated Queries
(OMQs) based on Guarded TGDs (GTGDs) and Unions of Conjunctive Queries (UCQs),
in the case where relational symbols have unrestricted arity and where the
parameter is the size of the OMQ. We establish exact criteria for
fixed-parameter tractability (fpt) evaluation of recursively enumerable classes
of such OMQs (under the widely held Exponential Time Hypothesis). One of the
main technical tools introduced in the paper is an fpt-reduction from deciding
parameterized uniform CSPs to parameterized OMQ evaluation. The reduction
preserves measures which are known to be essential for classifying recursively
enumerable classes of parameterized uniform CSPs: submodular width (according
to the well known result of Marx for unrestricted-arity schemas) and treewidth
(according to the well known result of Grohe for bounded-arity schemas). As
such, it can be employed to obtain hardness results for evaluation of
recursively enumerable classes of parameterized OMQs both in the unrestricted
and in the bounded arity case. Previously, in the case of bounded arity
schemas, this has been tackled using a technique requiring full introspection
into the construction employed by Grohe.
|
cs.*
|
This volume contains the accepted papers at the third Workshop on Membrane
Computing and Biologically Inspired Process Calculi, held in Bologna on 5th
September 2009. The papers are devoted to both membrane computing and
biologically inspired process calculi, as well as to other related formalisms.
The papers of this volume are selected by the programme committee due to their
quality and relevance; they have defined an exciting programme highlighting
interesting problems and stimulating the search for novel ways of describing
related biological phenomena. In addition, we had an invited talk given by Luca
Cardelli on a spatial process algebra for developmental biology. Membrane
systems were introduced as a class of distributed parallel computing devices
inspired by the observation that any biological system is a complex
hierarchical structure, with a flow of materials and information that underlies
their functioning. The emphasis is on the computational properties of the
model, and it makes use of automata, languages, and complexity theoretic tools.
On the other hand, certain calculi such as mobile ambients and brane calculi
work with similar notions (compartments, membranes). These calculi are used to
model and analyze the various biological systems. The workshop on Membrane
Computing and Biologically Inspired Process Calculi brings together researchers
working in these fields to present their recent work and discuss new ideas
concerning the formalisms, their properties and relationships.
|
cs.*
|
We study the uniform query reliability problem, which asks, for a fixed
Boolean query Q, given an instance I, how many subinstances of I satisfy Q.
Equivalently, this is a restricted case of Boolean query evaluation on
tuple-independent probabilistic databases where all facts must have probability
1/2. We focus on graph signatures, and on queries closed under homomorphisms.
We show that for any such query that is unbounded, i.e., not equivalent to a
union of conjunctive queries, the uniform reliability problem is #P-hard. This
recaptures the hardness, e.g., of s-t connectedness, which counts how many
subgraphs of an input graph have a path between a source and a sink.
This new hardness result on uniform reliability strengthens our earlier
hardness result on probabilistic query evaluation for unbounded
homomorphism-closed queries (ICDT'20). Indeed, our earlier proof crucially used
facts with probability 1, so it did not apply to the unweighted case. The new
proof presented in this paper avoids this; it uses our recent hardness result
on uniform reliability for non-hierarchical conjunctive queries without
self-joins (ICDT'21), along with new techniques.
|
cs.*
|
Traditional UNIX time-share schedulers attempt to be fair to all users by
employing a round-robin style algorithm for allocating CPU time. Unfortunately,
a loophole exists whereby the scheduler can be biased in favor of a greedy user
running many short CPU-time processes. This loophole is not a defect but an
intrinsic property of the round-robin scheduler that ensures responsiveness to
the short CPU demands associated with multiple interactive users. A new
generation of UNIX system resource management software constrains the scheduler
to be equitable to all users regardless of the number of processes each may be
running. This "fair-share" scheduling draws on the concept of pro rating
resource "shares" across users and groups and then dynamically adjusting CPU
usage to meet those share proportions. The simple notion of statically
allocating these shares, however, belies the potential consequences for
performance as measured by user response time and service level targets. We
demonstrate this point by modeling several simple share allocation scenarios
and analyzing the corresponding performance effects. A brief comparison of
commercial system resource management implementations from HP, IBM, and SUN is
also given.
|
cs.*
|
The latest implementations of commercial UNIX to offer mainframe style
capacity management on enterprise servers include: AIX Workload Manager (WLM),
HP-UX Process Resource Manager (PRM), Solaris Resource Manager (SRM), as well
as SGI and Compaq. The ability to manage server capacity is achieved by making
significant modifications to the standard UNIX operating system so that
processes are inherently tied to specific users. Those users, in turn, are
granted only a certain fraction of system resources. Resource usage is
monitored and compared with each users grant to ensure that the assigned
entitlement constraints are met. In this paper, we begin by clearing up some of
the confusion that has surrounded the motivation and the terminology behind the
new technology. The common theme across each of the commercial implementations
is the introduction of the fair-share scheduler. After reviewing some potential
performance pitfalls, we present capacity planning guidelines for migrating to
automated UNIX resource management.
|
cs.*
|
Programming patterns for sequential file access in the .NET Framework are
described and the performance is measured. The default behavior provides
excellent performance on a single disk - 50 MBps both reading and writing.
Using large request sizes and doing file pre-allocation when possible have
quantifiable benefits. When one considers disk arrays, .NET unbuffered IO
delivers 800 MBps on a 16-disk array, but buffered IO delivers about 12% of
that performance. Consequently, high-performance file and database utilities
are still forced to use unbuffered IO for maximum sequential performance. The
report is accompanied by downloadable source code that demonstrates the
concepts and code that was used to obtain these measurements.
|
cs.*
|
The key to speeding up applications is often understanding where the elapsed
time is spent, and why. This document reviews in depth the full array of
performance analysis tools and techniques available on Linux for this task,
from the traditional tools like gcov and gprof, to the more advanced tools
still under development like oprofile and the Linux Trace Toolkit. The focus is
more on the underlying data collection and processing algorithms, and their
overhead and precision, than on the cosmetic details of the graphical user
interface frontends.
|
cs.*
|
Block devices in computer operating systems typically correspond to disks or
disk partitions, and are used to store files in a filesystem. Disks are not the
only real or virtual device which adhere to the block accessible stream of
bytes block device model. Files, remote devices, or even RAM may be used as a
virtual disks. This article examines several common combinations of block
device layers used as virtual disks in the Linux operating system: disk
partitions, loopback files, software RAID, Logical Volume Manager, and Network
Block Devices. It measures their relative performance using different
filesystems: Ext2, Ext3, ReiserFS, JFS, XFS,NFS.
|
cs.*
|
Under Windows operating system, existing I/O benchmarking tools does not
allow a developer to efficiently define a file access strategy according to the
applications' constraints. This is essentially due to the fact that the
existing tools do allow only a restricted set of I/O workloads that does not
generally correspond to the target applications. To cope with this problem, we
designed and implemented a precise I/O simulator allowing to simulate whatever
real I/O trace on a given defined architecture, and in which most of file and
disk cache strategies, their interactions and the detailed storage system
architecture are implemented. Simulation results on different workloads and
architectures show a very high degree of precision. In fact, the mean error
rate as compared to real measures is of about 6% with a maximum of 10% on
global throughput.
|
cs.*
|
The Intel Core i7 processor code named Nehalem provides a feature named Turbo
Boost which opportunistically varies the frequencies of the processor's cores.
The frequency of a core is determined by core temperature, the number of active
cores, the estimated power consumption, the estimated current consumption, and
operating system frequency scaling requests. For a chip multi-processor(CMP)
that has a small number of physical cores and a small set of performance
states, deciding the Turbo Boost frequency to use on a given core might not be
difficult. However, we do not know the complexity of this decision making
process in the context of a large number of cores, scaling to the 100s, as
predicted by researchers in the field.
|
cs.*
|
This paper proposes a novel solution: the elimination of paged virtual memory
and partial outsourcing of memory page allocation and manipulation from the
operating system kernel into the individual process' user space - a user mode
page allocator - which allows an application to have direct, bare metal access
to the page mappings used by the hardware Memory Management Unit (MMU) for its
part of the overall address space. A user mode page allocator based emulation
of the mmap() abstraction layer of dlmalloc is then benchmarked against the
traditional kernel mode implemented mmap() in a series of synthetic Monte-Carlo
and real world application settings. Given the superb synthetic and positive
real world results from the profiling conducted, this paper proposes that with
proper operating system and API support one could gain a further order higher
performance again while keeping allocator performance invariant to the amount
of memory being allocated or freed i.e. a 100x performance improvement or more
in some common use cases. It is rare that through a simple and easy to
implement API and operating system structure change one can gain a Silver
Bullet with the potential for a second one.
|
cs.*
|
It is often said that one of the biggest limitations on computer performance
is memory bandwidth (i.e."the memory wall problem"). In this position paper, I
argue that if historical trends in computing evolution (where growth in
available capacity is exponential and reduction in its access latencies is
linear) continue as they have, then this view is wrong - in fact we ought to be
concentrating on reducing whole system memory access latencies wherever
possible, and by "whole system" I mean that we ought to look at how software
can be unnecessarily wasteful with memory bandwidth due to legacy design
decisions. To this end I conduct a feasibility study to determine whether we
ought to virtualise the MMU for each application process such that it has
direct access to its own MMU page tables and the memory allocated to a process
is managed exclusively by the process and not the kernel. I find under typical
conditions that nearly scale invariant performance to memory allocation size is
possible such that hundreds of megabytes of memory can be allocated, relocated,
swapped and deallocated in almost the same time as kilobytes (e.g. allocating
8Mb is 10x quicker under this experimental allocator than a conventional
allocator, and resizing a 128Kb block to 256Kb block is 4.5x faster). I find
that first time page access latencies are improved tenfold; moreover, because
the kernel page fault handler is never called, the lack of cache pollution
improves whole application memory access latencies increasing performance by up
to 2x. Finally, I try binary patching existing applications to use the
experimental allocation technique, finding almost universal performance
improvements without having to recompile these applications to make better use
of the new facilities.
|
cs.*
|
Due to its attractive characteristics in terms of performance, weight and
power consumption, NAND flash memory became the main non volatile memory (NVM)
in embedded systems. Those NVMs also present some specific
characteristics/constraints: good but asymmetric I/O performance, limited
lifetime, write/erase granularity asymmetry, etc. Those peculiarities are
either managed in hardware for flash disks (SSDs, SD cards, USB sticks, etc.)
or in software for raw embedded flash chips. When managed in software, flash
algorithms and structures are implemented in a specific flash file system
(FFS). In this paper, we present a performance study of the most widely used
FFSs in embedded Linux: JFFS2, UBIFS,and YAFFS. We show some very particular
behaviors and large performance disparities for tested FFS operations such as
mounting, copying, and searching file trees, compression, etc.
|
cs.*
|
This paper presents Flashmon version 2, a tool for monitoring embedded Linux
NAND flash memory I/O requests. It is designed for embedded boards based
devices containing raw flash chips. Flashmon is a kernel module and stands for
"flash monitor". It traces flash I/O by placing kernel probes at the NAND
driver level. It allows tracing at runtime the 3 main flash operations: page
reads / writes and block erasures. Flashmon is (1) generic as it was
successfully tested on the three most widely used flash file systems that are
JFFS2, UBIFS and YAFFS, and several NAND chip models. Moreover, it is (2) non
intrusive, (3) has a controllable memory footprint, and (4) exhibits a low
overhead (<6%) on the traced system. Finally, it is (5) simple to integrate and
used as a standalone module or as a built-in function / module in existing
kernel sources. Monitoring flash memory operations allows a better
understanding of existing flash management systems by studying and analyzing
their behavior. Moreover it is useful in development phase for prototyping and
validating new solutions.
|
cs.*
|
Integrated CPU-GPU architecture provides excellent acceleration capabilities
for data parallel applications on embedded platforms while meeting the size,
weight and power (SWaP) requirements. However, sharing of main memory between
CPU applications and GPU kernels can severely affect the execution of GPU
kernels and diminish the performance gain provided by GPU. For example, in the
NVIDIA Tegra K1 platform which has the integrated CPU-GPU architecture, we
noticed that in the worst case scenario, the GPU kernels can suffer as much as
4X slowdown in the presence of co-running memory intensive CPU applications
compared to their solo execution. In this paper, we propose a software
mechanism, which we call BWLOCK++, to protect the performance of GPU kernels
from co-scheduled memory intensive CPU applications.
|
cs.*
|
The TrustZone technology, available in the vast majority of recent ARM
processors, allows the execution of code inside a so-called secure world. It
effectively provides hardware-isolated areas of the processor for sensitive
data and code, i.e., a trusted execution environment (TEE). The OP-TEE
framework provides a collection of toolchain, open-source libraries and secure
kernel specifically geared to develop applications for TrustZone. This paper
presents an in-depth performance- and energy-wise study of TrustZone using the
OP-TEE framework, including secure storage and the cost of switching between
secure and unsecure worlds, using emulated and hardware measurements.
|
cs.*
|
We present SplitFS, a file system for persistent memory (PM) that reduces
software overhead significantly compared to state-of-the-art PM file systems.
SplitFS presents a novel split of responsibilities between a user-space library
file system and an existing kernel PM file system. The user-space library file
system handles data operations by intercepting POSIX calls, memory-mapping the
underlying file, and serving the read and overwrites using processor loads and
stores. Metadata operations are handled by the kernel PM file system (ext4
DAX). SplitFS introduces a new primitive termed relink to efficiently support
file appends and atomic data operations. SplitFS provides three consistency
modes, which different applications can choose from, without interfering with
each other. SplitFS reduces software overhead by up-to 4x compared to the NOVA
PM file system, and 17x compared to ext4-DAX. On a number of micro-benchmarks
and applications such as the LevelDB key-value store running the YCSB
benchmark, SplitFS increases application performance by up to 2x compared to
ext4 DAX and NOVA while providing similar consistency guarantees.
|
cs.*
|
This paper is about three virtualization modes: VMware, Parallels, and Boot
Camping. The trade off of their testing is the hardware requirements. The main
question is, among the three, which is the most suitable? The answer actually
varies from user to user. It depends on the user needs. Moreover, it is
necessary to consider its performance, graphics, efficiency and reliability,
and interoperability, and that is our major scope. In order to take the final
decision in choosing one of the modes it is important to run some tests, which
costs a lot in terms of money, complexity, and time consumption. Therefore, in
order to overcome this trade off, most of the research has been done through
online benchmarking and my own anticipation. The final solution was extracted
after comparing all previously mentioned above and after rigorous testing made
which will be introduced later in this document.
|
cs.*
|
In this paper we analyze the influence that lower layers (file system, OS,
SSD) have on HDFS' ability to extract maximum performance from SSDs on the read
path. We uncover and analyze three surprising performance slowdowns induced by
lower layers that result in HDFS read throughput loss. First, intrinsic
slowdown affects reads from every new file system extent for a variable amount
of time. Second, temporal slowdown appears temporarily and periodically and is
workload-agnostic. Third, in permanent slowdown, some files can individually
and permanently become slower after a period of time. We analyze the impact of
these slowdowns on HDFS and show significant throughput loss. Individually,
each of the slowdowns can cause a read throughput loss of 10-15%. However,
their effect is cumulative. When all slowdowns happen concurrently, read
throughput drops by as much as 30%. We further analyze mitigation techniques
and show that two of the three slowdowns could be addressed via increased IO
request parallelism in the lower layers. Unfortunately, HDFS cannot
automatically adapt to use such additional parallelism. Our results point to a
need for adaptability in storage stacks. The reason is that an access pattern
that maximizes performance in the common case is not necessarily the same one
that can mask performance fluctuations.
|
cs.*
|
The embedded devices of today due to their CPU, RAM capabilities can run
various Linux distributions but in most cases they are different from general
purpose distributions as they are usually lighter and specific to the needs of
that particular system. In this project, we share the problems associated in
adopting a fully heavy-weight Debian based system like Ubuntu in
embedded/automotive platforms and provide solutions to optimize them to
identify unused/redundant content in the system. This helps developer to reduce
the hefty general purpose distribution to an application specific distribution.
The solution involves collecting usage data in the system in a non-invasive
manner (to avoid any drop in performance) to suggest users the redundant,
unused parts of the system that can be safely removed without impacting the
system functionality.
|
cs.*
|
This paper suggests a new memory partitioning scheme that can enhance process
lifecycle, while avoiding Low Memory Killer and Out-of-Memory Killer operations
on mobile devices. Our proposed scheme offers the complete concept of virtual
memory nodes in operating systems of Android devices.
|
cs.*
|
Performance isolation is a keystone for SLO guarantees with shared resources
in cloud and datacenter environments. To meet SLO requirements, the state of
the art relies on hardware QoS support (e.g., Intel RDT) to allocate shared
resources such as last-level caches and memory bandwidth for co-located
latency-critical applications. As a result, the number of latency-critical
applications that can be deployed on a physical machine is bounded by the
hardware allocation capability. Unfortunately, such hardware capability is very
limited. For example, Intel Xeon E5 v3 processors support at most four
partitions for last-level caches, i.e., at most four applications can have
dedicated resource allocation. This paper discusses the feasibility and
unexplored challenges of providing SLO guarantees beyond the limits of hardware
capability. We present CoCo to show the feasibility and the benefits. CoCo
schedules applications to time-share interference-free partitions as a
transparent software layer. Our evaluation shows that CoCo outperforms
non-partitioned and round-robin approaches by up to 9x and 1.2x.
|
cs.*
|
Public cloud providers seek to meet stringent performance requirements and
low hardware cost. A key driver of performance and cost is main memory. Memory
pooling promises to improve DRAM utilization and thereby reduce costs. However,
pooling is challenging under cloud performance requirements. This paper
proposes Pond, the first memory pooling system that both meets cloud
performance goals and significantly reduces DRAM cost. Pond builds on the
Compute Express Link (CXL) standard for load/store access to pool memory and
two key insights. First, our analysis of cloud production traces shows that
pooling across 8-16 sockets is enough to achieve most of the benefits. This
enables a small-pool design with low access latency. Second, it is possible to
create machine learning models that can accurately predict how much local and
pool memory to allocate to a virtual machine (VM) to resemble same-NUMA-node
memory performance. Our evaluation with 158 workloads shows that Pond reduces
DRAM costs by 7% with performance within 1-5% of same-NUMA-node VM allocations.
|
cs.*
|
The standardization of NVMe Zoned Namespaces (ZNS) in the NVMe 2.0
specification presents a unique new addition to storage devices. Unlike
traditional SSDs, where the flash media management idiosyncrasies are hidden
behind a flash translation layer (FTL) inside the device, ZNS devices push
certain operations regarding data placement and garbage collection out from the
device to the host. This allows the host to achieve more optimal data placement
and predictable garbage collection overheads, along with lower device write
amplification. Thus, additionally increasing flash media lifetime. As a result,
ZNS devices are gaining significant attention in the research community.
However, with the current software stack there are numerous ways of
integrating ZNS devices into a host system. In this work, we begin to
systematically analyze the integration options, report on the current software
support for ZNS devices in the Linux Kernel, and provide an initial set of
performance measurements. Our main findings show that larger I/O sizes are
required to saturate the ZNS device bandwidth, and configuration of the I/O
scheduler can provide workload dependent performance gains, requiring careful
consideration of ZNS integration and configuration depending on the application
workload and its access patterns. Our dataset and code are available at https:
//github.com/nicktehrany/ZNS-Study.
|
cs.*
|
Multi-tiered large memory systems call for rethinking of memory profiling and
migration because of the unique problems unseen in the traditional memory
systems with smaller capacity and fewer tiers. We develop MTM, an
application-transparent page management system based on three principles: (1)
connecting the control of profiling overhead with the profiling mechanism for
high-quality profiling; (2) building a universal page migration policy on the
complex multi-tiered memory for high performance; and (3) introducing huge page
awareness. We evaluate MTM using common big-data applications with realistic
working sets (hundreds of GB to 1 TB). MTM outperforms seven state-of-the-art
solutions by up to 42% (17% on average)
|
cs.*
|
Existing memory reclamation policies on mobile devices may be no longer valid
because they have negative effects on the response time of running
applications. In this paper, we propose SWAM, a new integrated memory
management technique that complements the shortcomings of both the swapping and
killing mechanism in mobile devices and improves the application
responsiveness. SWAM consists of (1) Adaptive Swap that performs swapping
adaptively into memory or storage device while managing the swap space
dynamically, (2) OOM Cleaner that reclaims shared object pages in the swap
space to secure available memory and storage space, and (3) EOOM Killer that
terminates processes in the worst case while prioritizing the lowest
initialization cost applications as victim processes first. Experimental
results demonstrate that SWAM significantly reduces the number of applications
killed by OOMK (6.5x lower), and improves application launch time (36% faster)
and response time (41% faster), compared to the conventional schemes.
|
cs.*
|
In the current high-performance and embedded computing era, full-stack
energy-centric design is paramount. Use cases require increasingly high
performance at an affordable power budget, often under real-time constraints.
Extreme heterogeneity and parallelism address these issues but greatly
complicate online power consumption assessment, which is essential for dynamic
hardware and software stack adaptations. We introduce a novel
architecture-agnostic power modeling methodology with state-of-the-art
accuracy, low overhead, and high responsiveness. Our methodology identifies the
best Performance Monitoring Counters (PMCs) to model the power consumption of
each hardware sub-system at each Dynamic Voltage and Frequency Scaling (DVFS)
state. The individual linear models are combined into a complete model that
effectively describes the power consumption of the whole system, achieving high
accuracy and low overhead. Our evaluation reports an average estimation error
of 7.5 % for power consumption and 1.3 % for energy. Furthermore, we propose
Runmeter, an open-source, PMC-based monitoring framework integrated into the
Linux kernel. Runmeter manages PMC samples collection and manipulation,
efficiently evaluating our power models at runtime. With a time overhead of
only 0.7 % in the worst case, Runmeter provides responsive and accurate power
measurements directly in the kernel, which can be employed for actuation
policies such as Dynamic Power Management (DPM) and power-aware task
scheduling.
|
cs.*
|
External fragmentation of physical memory occurs when adjacent differently
sized regions of allocated physical memory are freed at different times,
causing free memory to be physically discontiguous. It can significantly
degrade system performance and efficiency, such as reducing the ability to use
huge pages, a critical optimization on modern large-memory system. For decades
system developers have sought to avoid and mitigate fragmentation, but few
prior studies quantify and characterize it in production settings.
Moreover, prior work often artificially fragments physical memory to create
more realistic performance evaluations, but their fragmentation methodologies
are ad hoc and unvalidated. Out of 13 papers, we found 11 different
methodologies, some of which were subsequently found inadequate. The importance
of addressing fragmentation necessitates a validated and principled
methodology.
Our work fills these gaps in knowledge and methodology. We conduct a study of
memory fragmentation in production by observing 248 machines in the Computer
Sciences Department at University of Wisconsin - Madison for a week. We
identify six key memory usage patterns, and find that Linux's file cache and
page reclamation systems are major contributors to fragmentation because they
often obliviously break up contiguous memory. Finally, we create and\'uril, a
tool to artificially fragment memory during experimental research evaluations.
While and\'uril ultimately fails as a scientific tool, we discuss its design
ideas, merits, and failings in hope that they may inspire future research.
|
cs.*
|
System-level emulators have been used extensively for system design,
debugging and evaluation. They work by providing a system-level virtual machine
to support a guest operating system (OS) running on a platform with the same or
different native OS that uses the same or different instruction-set
architecture. For such system-level emulation, dynamic binary translation (DBT)
is one of the core technologies. A recently proposed learning-based DBT
approach has shown a significantly improved performance with a higher quality
of translated code using automatically learned translation rules. However, it
has only been applied to user-level emulation, and not yet to system-level
emulation. In this paper, we explore the feasibility of applying this approach
to improve system-level emulation, and use QEMU to build a prototype. ... To
achieve better performance, we leverage several optimizations that include
coordination overhead reduction to reduce the overhead of each coordination,
and coordination elimination and code scheduling to reduce the coordination
frequency. Experimental results show that it can achieve an average of 1.36X
speedup over QEMU 6.1 with negligible coordination overhead in the system
emulation mode using SPEC CINT2006 as application benchmarks and 1.15X on
real-world applications.
|
cs.*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.