text
stringlengths 29
3.76k
| label
stringclasses 8
values |
|---|---|
Scaling data storage is a significant concern in enterprise systems and
Storage Area Networks (SANs) are deployed as a means to scale enterprise
storage. SANs based on Fibre Channel have been used extensively in the last
decade while iSCSI is fast becoming a serious contender due to its reduced
costs and unified infrastructure. This work examines the performance of iSCSI
with multiple TCP connections. Multiple TCP connections are often used to
realize higher bandwidth but there may be no fairness in how bandwidth is
distributed. We propose a mechanism to share congestion information across
multiple flows in ``Fair-TCP'' for improved performance. Our results show that
Fair-TCP significantly improves the performance for I/O intensive workloads.
|
cs.*
|
Network operators are facing significant challenges meeting the demand for
more bandwidth, agile infrastructures, innovative services, while keeping costs
low. Network Functions Virtualization (NFV) and Cloud Computing are emerging as
key trends of 5G network architectures, providing flexibility, fast
instantiation times, support of Commercial Off The Shelf hardware and
significant cost savings. NFV leverages Cloud Computing principles to move the
data-plane network functions from expensive, closed and proprietary hardware to
the so-called Virtual Network Functions (VNFs). In this paper we deal with the
management of virtual computing resources (Unikernels) for the execution of
VNFs. This functionality is performed by the Virtual Infrastructure Manager
(VIM) in the NFV MANagement and Orchestration (MANO) reference architecture. We
discuss the instantiation process of virtual resources and propose a generic
reference model, starting from the analysis of three open source VIMs, namely
OpenStack, Nomad and OpenVIM. We improve the aforementioned VIMs introducing
the support for special-purpose Unikernels and aiming at reducing the duration
of the instantiation process. We evaluate some performance aspects of the VIMs,
considering both stock and tuned versions. The VIM extensions and performance
evaluation tools are available under a liberal open source licence.
|
cs.*
|
Minimizing the energy consumption of Linux-based devices is an essential step
towards their wide deployment in various IoT scenarios. Energy saving methods
such as duty-cycling aim to address this constraint by limiting the amount of
time the device is powered on. In this work we study and improve the amount of
time a Linux-based IoT device is powered on to accomplish its tasks. We analyze
the processes of system boot up and shutdown on two platforms, the Raspberry Pi
3 and Raspberry Pi Zero Wireless, and enhance duty-cycling performance by
identifying and disabling time-consuming or unnecessary units initialized in
the userspace. We also study whether SD card speed and SD card capacity
utilization affect boot up duration and energy consumption. In addition, we
propose 'Pallex', a parallel execution framework built on top of the 'systemd
init' system to run a user application concurrently with userspace
initialization. We validate the performance impact of Pallex when applied to
various IoT application scenarios: (i) capturing an image, (ii) capturing and
encrypting an image, (iii) capturing and classifying an image using the the
k-nearest neighbor algorithm, and (iv) capturing images and sending them to a
cloud server. Our results show that system lifetime is increased by 18.3%,
16.8%, 13.9% and 30.2%, for these application scenarios, respectively.
|
cs.*
|
The task of similarity search in multimedia databases is usually accomplished
by range or k nearest neighbor queries. However, the expressing power of these
"single-example" queries fails when the user's delicate query intent is not
available as a single example. Recently, the well-known skyline operator was
reused in metric similarity search as a "multi-example" query type. When
applied on a multi-dimensional database (i.e., on a multi-attribute table), the
traditional skyline operator selects all database objects that are not
dominated by other objects. The metric skyline query adopts the skyline
operator such that the multiple attributes are represented by distances
(similarities) to multiple query examples. Hence, we can view the metric
skyline as a set of representative database objects which are as similar to all
the examples as possible and, simultaneously, are semantically distinct. In
this paper we propose a technique of processing the metric skyline query by use
of PM-tree, while we show that our technique significantly outperforms the
original M-tree based implementation in both time and space costs. In
experiments we also evaluate the partial metric skyline processing, where only
a controlled number of skyline objects is retrieved.
|
cs.*
|
We describe SAFIUS, a secure accountable file system that resides over an
untrusted storage. SAFIUS provides strong security guarantees like
confidentiality, integrity, prevention from rollback attacks, and
accountability. SAFIUS also enables read/write sharing of data and provides the
standard UNIX-like interface for applications. To achieve accountability with
good performance, it uses asynchronous signatures; to reduce the space required
for storing these signatures, a novel signature pruning mechanism is used.
SAFIUS has been implemented on a GNU/Linux based system modifying OpenGFS.
Preliminary performance studies show that SAFIUS has a tolerable overhead for
providing secure storage: while it has an overhead of about 50% of OpenGFS in
data intensive workloads (due to the overhead of performing
encryption/decryption in software), it is comparable (or better in some cases)
to OpenGFS in metadata intensive workloads.
|
cs.*
|
In this paper we investigate performance of global communications in a
particular parallel code. The code simulates dynamics of expansion of premixed
spherical flames using an asymptotic model of Sivashinsky type and a spectral
numerical algorithm. As a result, the code heavily relies on global all-to-all
interprocessor communications implementing transposition of the distributed
data array in which numerical solution to the problem is stored. This global
data interdependence makes interprocessor connectivity of the HPC system as
important as the floating-point power of the processors of which the system is
built. Our experiments show that efficient numerical simulation of this
particular model, with global data interdependence, on modern HPC systems is
possible. Prospects of performance of more sophisticated models of flame
dynamics are analysed as well.
|
cs.*
|
Molecular dynamics simulations, an indispensable research tool in
computational chemistry and materials science, consume a significant portion of
the supercomputing cycles around the world. We focus on multi-body potentials
and aim at achieving performance portability. Compared with well-studied pair
potentials, multibody potentials deliver increased simulation accuracy but are
too complex for effective compiler optimization. Because of this, achieving
cross-platform performance remains an open question. By abstracting from target
architecture and computing precision, we develop a vectorization scheme
applicable to both CPUs and accelerators. We present results for the Tersoff
potential within the molecular dynamics code LAMMPS on several architectures,
demonstrating efficiency gains not only for computational kernels, but also for
large-scale simulations. On a cluster of Intel Xeon Phi's, our optimized solver
is between 3 and 5 times faster than the pure MPI reference.
|
cs.*
|
We retrieved and analyzed parallel storage workloads of the FUJITSU K5 cloud
service to clarify how to build cost-effective hybrid storage systems. A hybrid
storage system consists of fast but low-capacity tier (first tier) and slow but
high-capacity tier (second tier). And, it typically consists of either SSDs and
HDDs or NVMs and SSDs. As a result, we found that 1) regions for first tier
should be assigned only if a workload includes large number of IO accesses for
a whole day, 2) the regions that include a large number of IO accesses should
be dynamically chosen and moved from second tier to first tier for a short
interval, and 3) if a cache hit ratio is regularly low, use of the cache for
the workload should be cancelled, and the whole workload region should be
assigned to the region for first tier. These workloads already have been
released from the SNIA web site.
|
cs.*
|
Replication of scientific experiments is critical to the advance of science.
Unfortunately, the discipline of Computer Science has never treated replication
seriously, even though computers are very good at doing the same thing over and
over again. Not only are experiments rarely replicated, they are rarely even
replicable in a meaningful way. Scientists are being encouraged to make their
source code available, but this is only a small step. Even in the happy event
that source code can be built and run successfully, running code is a long way
away from being able to replicate the experiment that code was used for. I
propose that the discipline of Computer Science must embrace replication of
experiments as standard practice. I propose that the only credible technique to
make experiments truly replicable is to provide copies of virtual machines in
which the experiments are validated to run. I propose that tools and
repositories should be made available to make this happen. I propose to be one
of those who makes it happen.
|
cs.*
|
The Gordon and Betty Moore Foundation ran an Investigator Competition as part
of its Data-Driven Discovery Initiative in 2014. We received about 1,100
applications and each applicant had the opportunity to list up to five
influential works in the general field of "Big Data" for scientific discovery.
We collected nearly 5,000 references and 53 works were cited at least six
times. This paper contains our preliminary findings.
|
cs.*
|
Rankings are a fact of life. Whether or not one likes them, they exist and
are influential. Within academia, and in computer science in particular,
rankings not only capture our attention but also widely influence people who
have a limited understanding of computing science research, including
prospective students, university administrators, and policy-makers. In short,
rankings matter. This position paper advocates for the adoption of "GOTO
rankings": rankings that use Good data, are Open, Transparent, and Objective,
and the rejection of rankings that do not meet these criteria.
|
cs.*
|
This paper gives a systematic research review at the boundary of the
information systems (IS) and marketing disciplines. First, a historical
overview of these disciplines is given to put the review into context. This is
followed by a bibliographic analysis to select articles at the boundary of IS
and marketing. Text analysis is then performed on the selected articles to
group them into homogeneous research clusters, which are refined by selecting
"distinct" articles that best represent the clusters. The citation asymmetries
between IS and marketing are noted and an overall conceptual model is created
that describes the "areas of collaboration" between IS and marketing. Forward
looking suggestions are made on how academic researchers can better interface
with industry and how academic research at the boundary of IS and marketing can
be further developed.
|
cs.*
|
On August 2, 2021 a group of concerned scientists and US funding agency and
federal government officials met for an informal discussion to explore the
value and need for a well-coordinated US Open Research Commons (ORC); an
interoperable collection of data and compute resources within both the public
and private sectors which are easy to use and accessible to all.
|
cs.*
|
Expansive, informative datasets are vital in providing foundations and
possibilities for scientific research and development across many fields of
study. Assembly of grand datasets, however, frequently poses difficulty for the
author and stakeholders alike, with a variety of considerations required
throughout the collaboration efforts and development lifecycle. In this work,
we discuss and analyse the challenges and opportunities we faced throughout the
creation of a transnational, European agricultural dataset containing reference
labels of cultivated crops. Together, this forms a succinct framework of
important elements one should consider when forging a dataset of their own.
|
cs.*
|
Consensus on the definition of data science remains low despite the
widespread establishment of academic programs in the field and continued demand
for data scientists in industry. Definitions range from rebranded statistics to
data-driven science to the science of data to simply the application of machine
learning to so-called big data to solve real-world problems. Current efforts to
trace the history of the field in order to clarify its definition, such as
Donoho's "50 Years of Data Science" (Donoho 2017), tend to focus on a short
period when a small group of statisticians adopted the term in an unsuccessful
attempt to rebrand their field in the face of the overshadowing effects of
computational statistics and data mining. Using textual evidence from primary
sources, this essay traces the history of the term to the 1960s, when it was
first used by the US Air Force in a surprisingly similar way to its current
usage, to 2012, the year that Harvard Business Review published the enormously
influential article "Data Scientist: The Sexiest Job of the 21st Century"
(Davenport and Patil 2012), while the American Statistical Association
acknowledged a profound disconnect between statistics and data science. Among
the themes that emerge from this review are (1) the long-standing opposition
between data analysts and data miners that continues to animate the field, (2)
an established definition of the term as the practice of managing and
processing scientific data that has been occluded by recent usage, and (3) the
phenomenon of data impedance -- the disproportion between surplus data, indexed
by phrases like data deluge and big data, and the limitations of computational
machinery and methods to process them. This persistent condition appears to
have motivated the use of the term and the field itself since its beginnings.
|
cs.*
|
The main goal of our work is to formally prove the correctness of the key
commands of the SCHUR software, an interactive program for calculating with
characters of Lie groups and symmetric functions. The core of the computations
relies on enumeration and manipulation of combinatorial structures. As a first
"proof of concept", we present a formal proof of the conjugate function,
written in C. This function computes the conjugate of an integer partition. To
formally prove this program, we use the Frama-C software. It allows us to
annotate C functions and to generate proof obligations, which are proved using
several automated theorem provers. In this paper, we also draw on methodology,
discussing on how to formally prove this kind of program.
|
cs.*
|
The main computing tasks of a finite element code(FE) for solving partial
differential equations (PDE's) are the algebraic system assembly and the
iterative solver. This work focuses on the first task, in the context of a
hybrid MPI+X paradigm. Although we will describe algorithms in the FE context,
a similar strategy can be straightforwardly applied to other discretization
methods, like the finite volume method. The matrix assembly consists of a loop
over the elements of the MPI partition to compute element matrices and
right-hand sides and their assemblies in the local system to each MPI
partition. In a MPI+X hybrid parallelism context, X has consisted traditionally
of loop parallelism using OpenMP. Several strategies have been proposed in the
literature to implement this loop parallelism, like coloring or substructuring
techniques to circumvent the race condition that appears when assembling the
element system into the local system. The main drawback of the first technique
is the decrease of the IPC due to bad spatial locality. The second technique
avoids this issue but requires extensive changes in the implementation, which
can be cumbersome when several element loops should be treated. We propose an
alternative, based on the task parallelism of the element loop using some
extensions to the OpenMP programming model. The taskification of the assembly
solves both aforementioned problems. In addition, dynamic load balance will be
applied using the DLB library, especially efficient in the presence of hybrid
meshes, where the relative costs of the different elements is impossible to
estimate a priori. This paper presents the proposed methodology, its
implementation and its validation through the solution of large computational
mechanics problems up to 16k cores.
|
cs.*
|
Sparse tensor decomposition and completion are common in numerous
applications, ranging from machine learning to computational quantum chemistry.
Typically, the main bottleneck in optimization of these models are contractions
of a single large sparse tensor with a network of several dense matrices or
tensors (SpTTN). Prior works on high-performance tensor decomposition and
completion have focused on performance and scalability optimizations for
specific SpTTN kernels. We present algorithms and a runtime system for
identifying and executing the most efficient loop nest for any SpTTN kernel. We
consider both enumeration of such loop nests for autotuning and efficient
algorithms for finding the lowest cost loop-nest for simpler metrics, such as
buffer size or cache miss models. Our runtime system identifies the best choice
of loop nest without user guidance, and also provides a distributed-memory
parallelization of SpTTN kernels. We evaluate our framework using both
real-world and synthetic tensors. Our results demonstrate that our approach
outperforms available generalized state-of-the-art libraries and matches the
performance of specialized codes.
|
cs.*
|
Progress in High-Performance Computing in general, and High-Performance Graph
Processing in particular, is highly dependent on the availability of
publicly-accessible, relevant, and realistic data sets.
To ensure continuation of this progress, we (i) investigate and optimize the
process of generating large sequence similarity graphs as an HPC challenge and
(ii) demonstrate this process in creating MS-BioGraphs, a new family of
publicly available real-world edge-weighted graph datasets with up to $2.5$
trillion edges, that is, $6.6$ times greater than the largest graph published
recently. The largest graph is created by matching (i.e., all-to-all similarity
aligning) $1.7$ billion protein sequences. The MS-BioGraphs family includes
also seven subgraphs with different sizes and direction types.
We describe two main challenges we faced in generating large graph datasets
and our solutions, that are, (i) optimizing data structures and algorithms for
this multi-step process and (ii) WebGraph parallel compression technique. We
present a comparative study of structural characteristics of MS-BioGraphs.
The datasets are available online on
https://blogs.qub.ac.uk/DIPSA/MS-BioGraphs .
|
cs.*
|
Low-level embedded systems are used to control cyber-phyiscal systems in
industrial and autonomous applications. They need to meet hard real-time
requirements as unanticipated controller delays on moving machines can have
devastating effects. Modern developments such as the industrial Internet of
Things and autonomous machines require these devices to connect to large IP
networks. Since Network Interface Controllers (NICs) trigger interrupts for
incoming packets, real-time embedded systems are subject to unpredictable
preemptions when connected to such networks.
In this work, we propose a priority-aware NIC design to moderate
network-generated interrupts by mapping IP flows to processes and based on
that, consolidates their packets into different queues. These queues apply
priority-dependent interrupt moderation. First experimental evaluations show
that 93% of interrupts can be saved leading to an 80% decrease of processing
delay of critical tasks in the configurations investigated.
|
cs.*
|
Modern datacenter applications are prone to high tail latencies since their
requests typically follow highly-dispersive distributions. Delivering fast
interrupts is essential to reducing tail latency. Prior work has proposed both
OS- and system-level solutions to reduce tail latencies for microsecond-scale
workloads through better scheduling. Unfortunately, existing approaches like
customized dataplane OSes, require significant OS changes, experience
scalability limitations, or do not reach the full performance capabilities
hardware offers.
The emergence of new hardware features like UINTR exposed new opportunities
to rethink the design paradigms and abstractions of traditional scheduling
systems. We propose LibPreemptible, a preemptive user-level threading library
that is flexible, lightweight, and adaptive. LibPreemptible was built with a
set of optimizations like LibUtimer for scalability, and deadline-oriented API
for flexible policies, time-quantum controller for adaptiveness. Compared to
the prior state-of-the-art scheduling system Shinjuku, our system achieves
significant tail latency and throughput improvements for various workloads
without modifying the kernel. We also demonstrate the flexibility of
LibPreemptible across scheduling policies for real applications experiencing
varying load levels and characteristics.
|
cs.*
|
Several solutions for specifying normative artefacts (norms, contracts,
policies) in a computational processable way have been presented in the
literature. Legal core ontologies have been proposed to systematize concepts
and relationships relevant to normative reasoning. However, no solution amongst
those has achieved general acceptance, and no common ground (representational,
computational) has been identified enabling us to easily compare them. Yet, all
these efforts share the same motivation of representing normative directives,
therefore it is plausible that there may be a representational model
encompassing all of them. This presentation will introduce DPCL, a
domain-specific language (DSL) for specifying higher-level policies (including
norms, contracts, etc.), centred on Hohfeld's framework of fundamental legal
concepts. DPCL has to be seen primarily as a "template", i.e. as an
informational model for architectural reference, rather than a fully-fledged
formal language; it aims to make explicit the general requirements that should
be expected in a language for norm specification. In this respect, it goes
rather in the direction of legal core ontologies, but differently from those,
our proposal aims to keep the character of a DSL, rather than a set of axioms
in a logical framework: it is meant to be cross-compiled to underlying
languages/tools adequate to the type of target application. We provide here an
overview of some of the language features.
|
cs.*
|
This paper reports on work aimed at supporting knowledge and expertise
finding within a large Research and Development (R&D) organisation. The paper
first discusses the nature of knowledge important to R&D organisations and
presents a prototype information system developed to support knowledge and
expertise finding. The paper then discusses a trial of the system within an R&D
organisation, the implications and limitations of the trial, and discusses
future research questions.
|
cs.*
|
Hypersparse matrices are a powerful enabler for a variety of network, health,
finance, and social applications. Hierarchical hypersparse GraphBLAS matrices
enable rapid streaming updates while preserving algebraic analytic power and
convenience. In many contexts, the rate of these updates sets the bounds on
performance. This paper explores hierarchical hypersparse update performance on
a variety of hardware with identical software configurations. The high-level
language bindings of the GraphBLAS readily enable performance experiments on
simultaneous diverse hardware. The best single process performance measured was
4,000,000 updates per second. The best single node performance measured was
170,000,000 updates per second. The hardware used spans nearly a decade and
allows a direct comparison of hardware improvements for this computation over
this time range; showing a 2x increase in single-core performance, a 3x
increase in single process performance, and a 5x increase in single node
performance. Running on nearly 2,000 MIT SuperCloud nodes simultaneously
achieved a sustained update rate of over 200,000,000,000 updates per second.
Hierarchical hypersparse GraphBLAS allows the MIT SuperCloud to analyze
extremely large streaming network data sets.
|
cs.*
|
The Advancing Data Justice Research and Practice (ADJRP) project aims to
widen the lens of current thinking around data justice and to provide
actionable resources that will help policymakers, practitioners, and impacted
communities gain a broader understanding of what equitable, freedom-promoting,
and rights-sustaining data collection, governance, and use should look like in
increasingly dynamic and global data innovation ecosystems. In this integrated
literature review we hope to lay the conceptual groundwork needed to support
this aspiration. The introduction motivates the broadening of data justice that
is undertaken by the literature review which follows. First, we address how
certain limitations of the current study of data justice drive the need for a
re-location of data justice research and practice. We map out the strengths and
shortcomings of the contemporary state of the art and then elaborate on the
challenges faced by our own effort to broaden the data justice perspective in
the decolonial context. The body of the literature review covers seven thematic
areas. For each theme, the ADJRP team has systematically collected and analysed
key texts in order to tell the critical empirical story of how existing social
structures and power dynamics present challenges to data justice and related
justice fields. In each case, this critical empirical story is also
supplemented by the transformational story of how activists, policymakers, and
academics are challenging longstanding structures of inequity to advance social
justice in data innovation ecosystems and adjacent areas of technological
practice.
|
cs.*
|
Double-blind review relies on the authors' ability and willingness to
effectively anonymize their submissions. We explore anonymization effectiveness
at ASE 2016, OOPSLA 2016, and PLDI 2016 by asking reviewers if they can guess
author identities. We find that 74%-90% of reviews contain no correct guess and
that reviewers who self-identify as experts on a paper's topic are more likely
to attempt to guess, but no more likely to guess correctly. We present our
findings, summarize the PC chairs' comments about administering double-blind
review, discuss the advantages and disadvantages of revealing author identities
part of the way through the process, and conclude by advocating for the
continued use of double-blind review.
|
cs.*
|
This volume represents the proceedings of the 5th Workshop on Membrane
Computing and Biologically Inspired Process Calculi (MeCBIC 2011), held
together with the 12th International Conference on Membrane Computing on 23rd
August 2011 in Fontainebleau, France.
|
cs.*
|
Ising machines are specialized computers for finding the lowest energy states
of Ising spin models, onto which many practical combinatorial optimization
problems can be mapped. Simulated bifurcation (SB) is a quantum-inspired
parallelizable algorithm for Ising problems that enables scalable multi-chip
implementations of Ising machines. However, the computational performance of a
previously proposed multi-chip architecture tends to saturate as the number of
chips increases for a given problem size because both computation and
communication are exclusive in the time domain. In this paper, we propose a
streaming architecture for multi-chip implementations of SB-based Ising
machines with full spin-to-spin connectivity. The data flow in in-chip
computation is harmonized with the data flow in inter-chip communication,
enabling the computation and communication to overlap and the communication
time to be hidden. Systematic experiments demonstrate linear strong scaling of
performance up to the vicinity of the ideal communication limit determined only
by the latency of chip-to-chip communication. Our eight-FPGA
(field-programmable gate array) cluster can compute a 32,768-spin problem with
a high pipeline efficiency of 97.9%. The performance of a 79-FPGA cluster for a
100,000-spin problem, projected using a theoretical performance model validated
on smaller experimental clusters, is comparable to that of a state-of-the-art
100,000-spin optical Ising machine.
|
cs.*
|
In this paper we present a graphical programming framework, LabVIEW, and
associated language and libraries, as well as programming techniques and
patterns that we have found useful in making FPGAs accessible to scientists and
engineers as domain expert software programmers.
|
cs.*
|
As mathematical computing becomes more democratized in high-level languages,
high-performance symbolic-numeric systems are necessary for domain scientists
and engineers to get the best performance out of their machine without deep
knowledge of code optimization. Naturally, users need different term types
either to have different algebraic properties for them, or to use efficient
data structures. To this end, we developed Symbolics.jl, an extendable symbolic
system which uses dynamic multiple dispatch to change behavior depending on the
domain needs. In this work we detail an underlying abstract term interface
which allows for speed without sacrificing generality. We show that by
formalizing a generic API on actions independent of implementation, we can
retroactively add optimized data structures to our system without changing the
pre-existing term rewriters. We showcase how this can be used to optimize term
construction and give a 113x acceleration on general symbolic transformations.
Further, we show that such a generic API allows for complementary
term-rewriting implementations. We demonstrate the ability to swap between
classical term-rewriting simplifiers and e-graph-based term-rewriting
simplifiers. We showcase an e-graph ruleset which minimizes the number of CPU
cycles during expression evaluation, and demonstrate how it simplifies a
real-world reaction-network simulation to halve the runtime. Additionally, we
show a reaction-diffusion partial differential equation solver which is able to
be automatically converted into symbolic expressions via multiple dispatch
tracing, which is subsequently accelerated and parallelized to give a 157x
simulation speedup. Together, this presents Symbolics.jl as a next-generation
symbolic-numeric computing environment geared towards modeling and simulation.
|
cs.*
|
In this paper, we revisit the design of synchronization
primitives---specifically barriers, mutexes, and semaphores---and how they
apply to the GPU. Previous implementations are insufficient due to the
discrepancies in hardware and programming model of the GPU and CPU. We create
new implementations in CUDA and analyze the performance of spinning on the GPU,
as well as a method of sleeping on the GPU, by running a set of memory-system
benchmarks on two of the most common GPUs in use, the Tesla- and Fermi-class
GPUs from NVIDIA. From our results we define higher-level principles that are
valid for generic many-core processors, the most important of which is to limit
the number of atomic accesses required for a synchronization operation because
atomic accesses are slower than regular memory accesses. We use the results of
the benchmarks to critique existing synchronization algorithms and guide our
new implementations, and then define an abstraction of GPUs to classify any GPU
based on the behavior of the memory system. We use this abstraction to create
suitable implementations of the primitives specifically targeting the GPU, and
analyze the performance of these algorithms on Tesla and Fermi. We then predict
performance on future GPUs based on characteristics of the abstraction. We also
examine the roles of spin waiting and sleep waiting in each primitive and how
their performance varies based on the machine abstraction, then give a set of
guidelines for when each strategy is useful based on the characteristics of the
GPU and expected contention.
|
cs.*
|
As nuclear power expands, technical, economic, political, and environmental
analyses of nuclear fuel cycles by simulators increase in importance. To date,
however, current tools are often fleet-based rather than discrete and
restrictively licensed rather than open source. Each of these choices presents
a challenge to modeling fidelity, generality, efficiency, robustness, and
scientific transparency. The Cyclus nuclear fuel cycle simulator framework and
its modeling ecosystem incorporate modern insights from simulation science and
software architecture to solve these problems so that challenges in nuclear
fuel cycle analysis can be better addressed. A summary of the Cyclus fuel cycle
simulator framework and its modeling ecosystem are presented. Additionally, the
implementation of each is discussed in the context of motivating challenges in
nuclear fuel cycle simulation. Finally, the current capabilities of Cyclus are
demonstrated for both open and closed fuel cycles.
|
cs.*
|
In this work we present the Secure Machine, SeM for short, a CPU architecture
extension for secure computing. SeM uses a small amount of in-chip additional
hardware that monitors key communication channels inside the CPU chip, and only
acts when required. SeM provides confidentiality and integrity for a secure
program without trusting the platform software or any off-chip hardware. SeM
supports existing binaries of single- and multi-threaded applications running
on single- or multi-core, multi-CPU. The performance reduction caused by it is
only few percent, most of which is due to the memory encryption layer that is
commonly used in many secure architectures.
We also developed SeM-Prepare, a software tool that automatically instruments
existing applications (binaries) with additional instructions so they can be
securely executed on our architecture without requiring any programming efforts
or the availability of the desired program`s source code.
To enable secure data sharing in shared memory environments, we developed
Secure Distributed Shared Memory (SDSM), an efficient (time and memory)
algorithm for allowing thousands of compute nodes to share data securely while
running on an untrusted computing environment. SDSM shows a negligible
reduction in performance, and it requires negligible and hardware resources. We
developed Distributed Memory Integrity Trees, a method for enhancing single
node integrity trees for preserving the integrity of a distributed application
running on an untrusted computing environment. We show that our method is
applicable to existing single node integrity trees such as Merkle Tree, Bonsai
Merkle Tree, and Intel`s SGX memory integrity engine. All these building blocks
may be used together to form a practical secure system, and some can be used in
conjunction with other secure systems.
|
cs.*
|
The THedu'11 workshop received thirteen submissions, twelve of which were
accepted and presented during the workshop. For the post-conference proceedings
nine submission where received and accepted. The submissions are within the
scope of the following points, which have been announced in the call of papers:
CTP-based software tools for education; CTP technology combined with novel
interfaces, drag and drop, etc.; technologies to access ITP knowledge relevant
for a certain step of problem solving; usability considerations on representing
ITP knowledge; combination of deduction and computation; formal problem
specifications; effectiveness of ATP in checking user input; formats for
deductive content in proof documents, geometric constructions, etc; formal
domain models for e-learning in mathematics and applications.
|
cs.*
|
The static analysis of cache accesses consists in correctly predicting which
accesses are hits or misses. While there exist good exact and approximate
analyses for caches implementing the least recently used (LRU) replacement
policy, such analyses were harder to find for other replacement policies. A
theoretical explanation was found: for an appropriate setting of analysis over
control-flow graphs, cache analysis is PSPACE-complete for all common
replacement policies (FIFO, PLRU, NMRU) except for LRU, for which it is only
NP-complete. In this paper, we show that if procedure calls are added to the
control flow, then the gap widens: analysis remains NP-complete for LRU, but
becomes EXPTIME-complete for the three other policies. For this, we improve on
earlier results on the complexity of reachability problems on Boolean programs
with procedure calls. In addition, for the LRU policy we derive a backtracking
algorithm as well as an approach for using it as a last resort after other
analyses have failed to conclude.
|
cs.*
|
Physical processes are computations only when we use them to externalize
thought. Computation is the performance of one or more fixed processes within a
contingent environment. We reformulate the Church-Turing thesis so that it
applies to programs rather than to computability. When suitably formulated
agent-based computing in an open, multi-scalar environment represents the
current consensus view of how we interact with the world. But we don't know how
to formulate multi-scalar environments.
|
cs.*
|
New methods are being employed to meet the Navy's changing
software-development environment.
|
cs.*
|
It has by now become a standard approach to use the theory of sparse (or
toric) elimination, based on the Newton polytope of a polynomial, in order to
reveal and exploit the structure of algebraic systems. This talk surveys
compact formulae, including older and recent results, in sparse elimination. We
start with root bounds and juxtapose two recent formulae: a generating function
of the m-B{\'e}zout bound and a closed-form expression for the mixed volume by
means of a matrix permanent. For the sparse resultant, a bevy of results have
established determinantal or rational formulae for a large class of systems,
starting with Macaulay. The discriminant is closely related to the resultant
but admits no compact formula except for very simple cases. We offer a new
determinantal formula for the discriminant of a sparse multilinear system
arising in computing Nash equilibria. We introduce an alternative notion of
compact formula, namely the Newton polytope of the unknown polynomial. It is
possible to compute it efficiently for sparse resultants, discriminants, as
well as the implicit equation of a parameterized variety. This leads us to
consider implicit matrix representations of geometric objects.
|
cs.*
|
This paper explores the role of operating system and high-level languages in
the development of software and domain-specific languages (DSLs) for
self-reconfigurable robotics. We review some of the current trends in
self-reconfigurable robotics and describe the development of a software system
for ATRON II which utilizes Linux and Python to significantly improve software
abstraction and portability while providing some basic features which could
prove useful when using Python, either stand-alone or via a DSL, on a
self-reconfigurable robot system. These features include transparent socket
communication, module identification, easy software transfer and reliable
module-to-module communication. The end result is a software platform for
modular robots that where appropriate builds on existing work in operating
systems, virtual machines, middleware and high-level languages.
|
cs.*
|
In the talk at the workshop my aim was to demonstrate the usefulness of graph
techniques for tackling problems that have been studied predominantly as
problems on the term level: increasing sharing in functional programs, and
addressing questions about Milner's process semantics for regular expressions.
For both situations an approach that is based on modeling terms by graphs with
structure constraints has turned out to be fruitful. In this extended abstract
I describe the underlying problems, give references, provide examples, indicate
the chosen approaches, and compare the initial situations as well as the
results that have been obtained, and some results that are being developed at
present.
|
cs.*
|
In a variety of applications, we need to keep track of the development of a
data set over time. For maintaining and querying this multi version data
I/O-efficiently, external memory data structures are required. In this paper,
we present a probabilistic self-balancing persistent data structure in external
memory called the persistent buffer tree, which supports insertions, updates
and deletions of data items at the present version and range queries for any
version, past or present. The persistent buffer tree is I/O-optimal in the
sense that the expected amortized I/O performance bounds are asymptotically the
same as the deterministic amortized bounds of the (single version) buffer tree
in the worst case.
|
cs.*
|
Over nearly three decades at the University of Wisconsin, Jeff Naughton has
left an indelible mark on computer science. He has been a global leader of the
database research field, deepening its core and pushing its boundaries. Many of
Naughton's ideas were translated directly into practice in commercial and
open-source systems. But software comes and goes. In the end, it is the ideas
themselves that have had impact, ideas written down in papers.
Naughton has been a prolific scholar over the last thirty years, with over
175 publications in his bibliography, covering a wide range of topics. This
document does not attempt to enumerate or even summarize the wealth of ideas
that Naughton has published over the course of his academic career--the task is
too daunting. Instead, the best this short note aims to do is to serve as a
rough map of the territory: something to help other researchers navigate the
wide spaces of Naughton's work.
|
cs.*
|
Monitoring often requires insight into the monitored system as well as
concrete specifications of expected behavior. More and more systems, however,
provide information about their inner procedures by emitting provenance
information in a W3C-standardized graph format.
In this work, we present an approach to monitor such provenance data for
anomalous behavior by performing spectral graph analysis on slices of the
constructed provenance graph and by comparing the characteristics of each slice
with those of a sliding window over recently seen slices. We argue that this
approach not only simplifies the monitoring of heterogeneous distributed
systems, but also enables applying a host of well-studied techniques to monitor
such systems.
|
cs.*
|
Data Science is a complex and evolving field, but most agree that it can be
defined as a combination of expertise drawn from three broad areascomputer
science and technology, math and statistics, and domain knowledge -- with the
purpose of extracting knowledge and value from data. Beyond this, the field is
often defined as a series of practical activities ranging from the cleaning and
wrangling of data, to its analysis and use to infer models, to the visual and
rhetorical representation of results to stakeholders and decision-makers. This
essay proposes a model of data science that goes beyond laundry-list
definitions to get at the specific nature of data science and help distinguish
it from adjacent fields such as computer science and statistics. We define data
science as an interdisciplinary field comprising four broad areas of expertise:
value, design, systems, and analytics. A fifth area, practice, integrates the
other four in specific contexts of domain knowledge. We call this the 4+1 model
of data science. Together, these areas belong to every data science project,
even if they are often unconnected and siloed in the academy.
|
cs.*
|
Efficient high-performance libraries often expose multiple tunable parameters
to provide highly optimized routines. These can range from simple loop unroll
factors or vector sizes all the way to algorithmic changes, given that some
implementations can be more suitable for certain devices by exploiting hardware
characteristics such as local memories and vector units. Traditionally, such
parameters and algorithmic choices are tuned and then hard-coded for a specific
architecture and for certain characteristics of the inputs. However, emerging
applications are often data-driven, thus traditional approaches are not
effective across the wide range of inputs and architectures used in practice.
In this paper, we present a new adaptive framework for data-driven applications
which uses a predictive model to select the optimal algorithmic parameters by
training with synthetic and real datasets. We demonstrate the effectiveness of
a BLAS library and specifically on its matrix multiplication routine. We
present experimental results for two GPU architectures and show significant
performance gains of up to 3x (on a high-end NVIDIA Pascal GPU) and 2.5x (on an
embedded ARM Mali GPU) when compared to a traditionally optimized library.
|
cs.*
|
The first associations to software sustainability might be the existence of a
continuous integration (CI) framework; the existence of a testing framework
composed of unit tests, integration tests, and end-to-end tests; and also the
existence of software documentation. However, when asking what is a common
deathblow for a scientific software product, it is often the lack of platform
and performance portability. Against this background, we designed the Ginkgo
library with the primary focus on platform portability and the ability to not
only port to new hardware architectures, but also achieve good performance. In
this paper we present the Ginkgo library design, radically separating
algorithms from hardware-specific kernels forming the distinct hardware
executors, and report our experience when adding execution backends for NVIDIA,
AMD, and Intel GPUs. We also comment on the different levels of performance
portability, and the performance we achieved on the distinct hardware backends.
|
cs.*
|
We discuss some specific software engineering challenges in the field of
high-performance computing, and argue that the slow adoption of SE tools and
techniques is at least in part caused by the fact that these do not address the
HPC challenges `out-of-the-box'. By giving some examples of solutions for
designing, testing and benchmarking HPC software, we intend to bring software
engineering and HPC closer together.
|
cs.*
|
In the realm of sound object-oriented program analyses for information-flow
control, very few approaches adopt flow-sensitive abstractions of the heap that
enable a precise modeling of implicit flows. To tackle this challenge, we
advance a new symbolic abstraction approach for modeling the heap in Java-like
programs. We use a store-less representation that is parameterized with a
family of relations among references to offer various levels of precision based
on user preferences. This enables us to automatically infer polymorphic
information-flow guards for methods via a co-reachability analysis of a
symbolic finite-state system. We instantiate the heap abstraction with three
different families of relations. We prove the soundness of our approach and
compare the precision and scalability obtained with each instantiated heap
domain by using the IFSpec benchmarks and real-life applications.
|
cs.*
|
To reduce their environmental impact, cloud datacenters' are increasingly
focused on optimizing applications' carbon-efficiency, or work done per mass of
carbon emitted. To facilitate such optimizations, we present Carbon Containers,
a simple system-level facility, which extends prior work on power containers,
that automatically regulates applications' carbon emissions in response to
variations in both their workload's intensity and their energy's
carbon-intensity. Specifically, \carbonContainerS enable applications to
specify a maximum carbon emissions rate (in g$\cdot$CO$_2$e/hr), and then
transparently enforce this rate via a combination of vertical scaling,
container migration, and suspend/resume while maximizing either
energy-efficiency or performance.
Carbon Containers are especially useful for applications that i) must
continue running even during high-carbon periods, and ii) execute in regions
with few variations in carbon-intensity. These low-variability regions also
tend to have high average carbon-intensity, which increases the importance of
regulating carbon emissions. We implement a Carbon Containers prototype by
extending Linux Containers to incorporate the mechanisms above and evaluate it
using real workload traces and carbon-intensity data from multiple regions. We
compare Carbon Containers with prior work that regulates carbon emissions by
suspending/resuming applications during high/low carbon periods. We show that
Carbon Containers are more carbon-efficient and improve performance while
maintaining similar carbon emissions.
|
cs.*
|
Rickrolling is an Internet cultural phenomenon born in the mid 2000s.
Originally confined to Internet fora, it has spread to other channels and
media. In this paper, we hypothesize that rickrolling has reached the formal
academic world. We design and conduct a systematic experiment to survey
rickrolling in the academic literature. As of March 2022, there are 23 academic
documents intentionally rickrolling the reader. Rickrolling happens in
footnotes, code listings, references. We believe that rickrolling in academia
proves inspiration and facetiousness, which is healthy for good science. This
original research suggests areas of improvement for academic search engines and
calls for more investigations about academic pranks and humor.
|
cs.*
|
Early in the pandemic, we -- leaders in the research areas of programming
languages (PL) and computer architecture (CA) -- realized that we had a
problem: the only way to form new lasting connections in the community was to
already have lasting connections in the community. Both of our academic
communities had wonderful short-term mentoring programs to address this
problem, but it was clear that we needed long-term mentoring programs.
Those of us in CA approached this scientifically, making an evidence-backed
case for community-wide long-term mentoring. In the meantime, one of us in PL
had impulsively launched an unofficial long-term mentoring program, founded on
chaos and spreadsheets. In January 2021, the latter grew to an official
cross-institutional long-term mentoring program called SIGPLAN-M; in January
2022, the former grew to Computer Architecture Long-term Mentoring (CALM).
The impacts have been strong: SIGPLAN-M reaches 328 mentees and 234 mentors
across 41 countries, and mentees have described it as "life changing" and "a
career saver." And while CALM is in its pilot phase -- with 13 mentors and 21
mentees across 7 countries -- it has received very positive feedback. The
leaders of SIGPLAN-M and CALM shared our designs, impacts, and challenges along
the way. Now, we wish to share those with you. We hope this will kick-start a
larger long-term mentoring effort across all of computer science.
|
cs.*
|
Nowadays, the use of embedded operating systems in different embedded
projects is subject to a tremendous growth. Embedded Linux is becoming one of
those most popular EOSs due to its modularity, efficiency, reliability, and
cost. One way to make it hard real-time is to include a real-time kernel like
Xenomai. One of the key characteristics of a Real-Time Operating System (RTOS)
is its ability to meet execution time deadlines deterministically. So, the more
precise and flexible the time management can be, the better it can handle
efficiently the determinism for different embedded applications. RTOS time
precision is characterized by a specific periodic interrupt service controlled
by a software time manager. The smaller the period of the interrupt, the better
the precision of the RTOS, the more it overloads the CPU, and though reduces
the overall efficiency of the RTOS. In this paper, we propose to drastically
reduce these overheads by migrating the time management service of Xenomai into
a configurable hardware component to relieve the CPU. The hardware component is
implemented in a Field Programmable Gate Array coupled to the CPU. This work
was achieved in a Master degree project where students could apprehend many
fields of embedded systems: RTOS programming, hardware design, performance
evaluation, etc.
|
cs.*
|
Modern DRAM architectures allow a number of low-power states on individual
memory ranks for advanced power management. Many previous studies have taken
advantage of demotions on low-power states for energy saving. However, most of
the demotion schemes are statically performed on a limited number of
pre-selected low-power states, and are suboptimal for different workloads and
memory architectures. Even worse, the idle periods are often too short for
effective power state transitions, especially for memory intensive
applications. Wrong decisions on power state transition incur significant
energy and delay penalties. In this paper, we propose a novel memory system
design named RAMZzz with rank-aware energy saving optimizations including
dynamic page migrations and adaptive demotions. Specifically, we group the
pages with similar access locality into the same rank with dynamic page
migrations. Ranks have their hotness: hot ranks are kept busy for high
utilization and cold ranks can have more lengthy idle periods for power state
transitions. We further develop adaptive state demotions by considering all
low-power states for each rank and a prediction model to estimate the
power-down timeout among states. We experimentally compare our algorithm with
other energy saving policies with cycle-accurate simulation. Experiments with
benchmark workloads show that RAMZzz achieves significant improvement on
energy-delay2 and energy consumption over other energy saving techniques.
|
cs.*
|
Non-volatile memory (NVM) technologies, being accessible in the same manner
as DRAM, are considered indispensable for expanding main memory capacities.
Intel Optane DCPMM is a long-awaited product that drastically increases main
memory capacities. However, a substantial performance gap exists between DRAM
and DCPMM. In our experiments, the read/write latencies of DCPMM were 400% and
407% higher than those of DRAM, respectively. The read/write bandwidths were
37% and 8% of those of DRAM. This performance gap in main memory presents a new
challenge to researchers; we need a new system software technology supporting
emerging hybrid memory architecture. In this paper, we present RAMinate, a
hypervisor-based virtualization mechanism for hybrid memory systems, and a key
technology to address the performance gap in main memory systems. It provides
great flexibility in memory management and maximizes the performance of virtual
machines (VMs) by dynamically optimizing memory mappings. Through experiments,
we confirmed that even though a VM has only 1% of DRAM in its RAM, the
performance degradation of the VM was drastically alleviated by memory mapping
optimization. The elapsed time to finish the build of Linux Kernel in the VM
was 557 seconds, which was only 13% increase from the 100% DRAM case (i.e., 495
seconds). When the optimization mechanism was disabled, the elapsed time
increased to 624 seconds (i.e. 26% increase from the 100% DRAM case).
|
cs.*
|
Large pages are commonly deployed to reduce address translation overheads for
big-memory workloads. Modern x86-64 processors from Intel and AMD support two
large page sizes -- 1GB and 2MB. However, previous works on large pages have
primarily focused on 2MB pages, partly due to lack of substantial evidence on
the profitability of 1GB pages to real-world applications. We argue that in
fact, inadequate system software support is responsible for a decade of
underutilized hardware support for 1GB pages.
Through extensive experimentation on a real system, we demonstrate that 1GB
pages can improve performance over 2MB pages, and when used in tandem with 2MB
pages for an important set of applications; the support for the latter is
crucial but missing in current systems. Our design and implementation of
\trident{} in Linux fully exploit hardware supported large pages by dynamically
and transparently allocating 1GB, 2MB, and 4KB pages as deemed suitable.
\trident{} speeds up eight memory-intensive applications by {$18\%$}, on
average, over Linux's use of 2MB pages. We also propose \tridentpv{}, an
extension to \trident{} that effectively virtualizes 1GB pages via copy-less
promotion and compaction in the guest OS. Overall, this paper shows that even
GB-sized pages have considerable practical significance with adequate software
enablement, in turn motivating architects to continue investing/innovating in
large pages.
|
cs.*
|
Poor time predictability of multicore processors has been a long-standing
challenge in the real-time systems community. In this paper, we make a case
that a fundamental problem that prevents efficient and predictable real-time
computing on multicore is the lack of a proper memory abstraction to express
memory criticality, which cuts across various layers of the system: the
application, OS, and hardware. We, therefore, propose a new holistic resource
management approach driven by a new memory abstraction, which we call
Deterministic Memory. The key characteristic of deterministic memory is that
the platform - the OS and hardware - guarantees small and tightly bounded
worst-case memory access timing. In contrast, we call the conventional memory
abstraction as best-effort memory in which only highly pessimistic worst-case
bounds can be achieved. We propose to utilize both abstractions to achieve high
time predictability but without significantly sacrificing performance. We
present deterministic memory-aware OS and architecture designs, including
OS-level page allocator, hardware-level cache, and DRAM controller designs. We
implement the proposed OS and architecture extensions on Linux and gem5
simulator. Our evaluation results, using a set of synthetic and real-world
benchmarks, demonstrate the feasibility and effectiveness of our approach.
|
cs.*
|
Multi-socket machines with 1-100 TBs of physical memory are becoming
prevalent. Applications running on multi-socket machines suffer non-uniform
bandwidth and latency when accessing physical memory. Decades of research have
focused on data allocation and placement policies in NUMA settings, but there
have been no studies on the question of how to place page-tables amongst
sockets. We make the case for explicit page-table allocation policies and show
that page-table placement is becoming crucial to overall performance. We
propose Mitosis to mitigate NUMA effects on page-table walks by transparently
replicating and migrating page-tables across sockets without application
changes. This reduces the frequency of accesses to remote NUMA nodes when
performing page-table walks. Mitosis uses two components: (i) a mechanism to
enable efficient page-table replication and migration; and (ii) policies for
processes to efficiently manage and control page-table replication and
migration. We implement Mitosis in Linux and evaluate its benefits on real
hardware. Mitosis improves performance for large-scale multi-socket workloads
by up to 1.34x by replicating page-tables across sockets. Moreover, it improves
performance by up to 3.24x in cases when the OS migrates a process across
sockets by enabling cross-socket page-table migration.
|
cs.*
|
We can use a hybrid memory system consisting of DRAM and Intel Optane DC
Persistent Memory (We call it DCPM in this paper) as DCPM is now commercially
available since April 2019. Even if the latency for DCPM is several times
higher than that for DRAM, the capacity for DCPM is several times higher than
that for DRAM and the cost of DCPM is also several times lower than that for
DRAM. In addition, DCPM is non-volatile. A Server with this hybrid memory
system could improve the performance for in-memory database systems and virtual
machine (VM) systems because these systems often consume a large amount of
memory. Moreover, a high-speed shared storage system can be implemented by
accessing DCPM via remote direct memory access (RDMA). I assume that some of
the DCPM is often assigned as a shared area among other remote servers because
applications executed on a server with a hybrid memory system often cannot use
the entire capacity of DCPM. This paper evaluates the interference between
local memory access and RDMA from a remote server. As a result, I indicate that
the interference on this hybrid memory system is significantly different from
that on a conventional DRAM-only memory system. I also believe that some kind
of throttling implementation is needed when this interference occures.
|
cs.*
|
Recently, the amount of running software on smart mobile devices is gradually
increasing due to the introduction of application stores. The application store
is a type of digital distribution platform for application software, which is
provided as a component of an operating system on a smartphone or tablet.
Mobile devices have limited memory capacity and, unlike server and desktop
systems, due to their mobility they do not have a memory slot that can expand
the memory capacity. Low memory killer (LMK) and out-of-memory killer (OOMK)
are widely used memory management solutions in mobile systems. They forcibly
terminate applications when the available physical memory becomes insufficient.
In addition, before the forced termination, the memory shortage incurs
thrashing and fragmentation, thus slowing down application performance.
Although the existing page reclamation mechanism is designed to secure
available memory, it could seriously degrade user responsiveness due to the
thrashing. Memory management is therefore still important especially in mobile
devices with small memory capacity. This paper presents a new memory
partitioning technique that resolves the deterioration of the existing
application life cycle induced by LMK and OOMK. It provides a completely
isolated virtual memory node at the operating system level. Evaluation results
demonstrate that the proposed method improves application execution time under
memory shortage, compared with methods in previous studies.
|
cs.*
|
The emerging CXL.mem standard provides a new type of byte-addressable remote
memory with a variety of memory types and hierarchies. With CXL.mem, multiple
layers of memory -- e.g., local DRAM and CXL-attached remote memory at
different locations -- are exposed to operating systems and user applications,
bringing new challenges and research opportunities. Unfortunately, since
CXL.mem devices are not commercially available, it is difficult for researchers
to conduct systems research that uses CXL.mem. In this paper, we present our
ongoing work, CXLMemSim, a fast and lightweight CXL.mem simulator for
performance characterization. CXLMemSim uses a performance model driven using
performance monitoring events, which are supported by most commodity
processors. Specifically, CXLMemSim attaches to an existing, unmodified
program, and divides the execution of the program into multiple epochs; once an
epoch finishes, CXLMemSim collects performance monitoring events and calculates
the simulated execution time of the epoch based on these events. Through this
method, CXLMemSim avoids the performance overhead of a full-system simulator
(e.g., Gem5) and allows the memory hierarchy and latency to be easily adjusted,
enabling research such as memory scheduling for complex applications. Our
preliminary evaluation shows that CXLMemSim slows down the execution of the
attached program by 4.41x on average for real-world applications.
|
cs.*
|
Motivated by the massive energy usage of blockchain, on the one hand, and by
significant performance improvements in low-power, wimpy systems, on the other
hand, we perform an in-depth time-energy analysis of blockchain systems on
low-power nodes in comparison to high-performance nodes. We use three low-power
systems to represent a wide range of the performance-power spectrum, while
covering both x86/64 and ARM architectures. We show that low-end wimpy nodes
are struggling to run full-fledged blockchains mainly due to their small and
low-bandwidth memory. On the other hand, wimpy systems with balanced
performance-to-power ratio achieve reasonable performance while saving
significant amounts of energy. For example, Jetson TX2 nodes achieve around 80%
and 30% of the throughput of Parity and Hyperledger, respectively, while using
18x and 23x less energy compared to traditional brawny servers with Intel Xeon
CPU.
|
cs.*
|
In this paper, we propose TAPA, an end-to-end framework that compiles a C++
task-parallel dataflow program into a high-frequency FPGA accelerator. Compared
to existing solutions, TAPA has two major advantages. First, TAPA provides a
set of convenient APIs that allow users to easily express flexible and complex
inter-task communication structures. Second, TAPA adopts a coarse-grained
floorplanning step during HLS compilation for accurate pipelining of potential
critical paths. In addition, TAPA implements several optimization techniques
specifically tailored for modern HBM-based FPGAs. In our experiments with a
total of 43 designs, we improve the average frequency from 147 MHz to 297 MHz
(a 102% improvement) with no loss of throughput and a negligible change in
resource utilization. Notably, in 16 experiments we make the originally
unroutable designs achieve 274 MHz on average. The framework is available at
https://github.com/UCLA-VAST/tapa and the core floorplan module is available at
https://github.com/UCLA-VAST/AutoBridge.
|
cs.*
|
Algorithms for laying out large graphs have seen significant progress in the
past decade. However, browsing large graphs remains a challenge. Rendering
thousands of graphical elements at once often results in a cluttered image, and
navigating these elements naively can cause disorientation. To address this
challenge we propose a method called GraphMaps, mimicking the browsing
experience of online geographic maps.
GraphMaps creates a sequence of layers, where each layer refines the previous
one. During graph browsing, GraphMaps chooses the layer corresponding to the
zoom level, and renders only those entities of the layer that intersect the
current viewport. The result is that, regardless of the graph size, the number
of entities rendered at each view does not exceed a predefined threshold, yet
all graph elements can be explored by the standard zoom and pan operations.
GraphMaps preprocesses a graph in such a way that during browsing, the
geometry of the entities is stable, and the viewer is responsive. Our case
studies indicate that GraphMaps is useful in gaining an overview of a large
graph, and also in exploring a graph on a finer level of detail.
|
cs.*
|
This document describes strategies for using Artificial Intelligence (AI) to
predict some journal article scores in future research assessment exercises.
Five strategies have been assessed.
|
cs.*
|
Emergence (macro-level effects from micro-level causes) is at the heart of
the conflict between reductionism and functionalism. How can there be
autonomous higher level laws of nature (the functionalist claim) if everything
can be reduced to the fundamental forces of physics (the reductionist
position)? We cut through this debate by applying a computer science lens to
the way we view nature. We conclude (a) that what functionalism calls the
special sciences (sciences other than physics) do indeed study autonomous laws
and furthermore that those laws pertain to real higher level entities but (b)
that interactions among such higher-level entities is epiphenomenal in that
they can always be reduced to primitive physical forces. In other words,
epiphenomena, which we will identify with emergent phenomena, do real
higher-level work. The proposed perspective provides a framework for
understanding many thorny issues including the nature of entities, stigmergy,
the evolution of complexity, phase transitions, supervenience, and downward
entailment. We also discuss some practical considerations pertaining to systems
of systems and the limitations of modeling.
|
cs.*
|
Organizations across all sectors are increasingly undergoing deep
transformation and restructuring towards data-driven operations. The central
role of data highlights the need for reliable and clean data. Unreliable,
erroneous, and incomplete data lead to critical bottlenecks in processing
pipelines and, ultimately, service failures, which are disastrous for the
competitive performance of the organization. Given its central importance,
those organizations which recognize and react to the need for reliable data
will have the advantage in the coming decade. We argue that the technologies
for reliable data are driven by distinct concerns and expertise which
complement those of the data scientist and the data engineer. Those
organizations which identify the central importance of meaningful, explainable,
reproducible, and maintainable data will be at the forefront of the
democratization of reliable data. We call the new role which must be developed
to fill this critical need the Knowledge Scientist. The organizational
structures, tools, methodologies and techniques to support and make possible
the work of knowledge scientists are still in their infancy. As organizations
not only use data but increasingly rely on data, it is time to empower the
people who are central to this transformation.
|
cs.*
|
Graph transformation is the rule-based modification of graphs, and is a
discipline dating back to the 1970s. The declarative nature of graph rewriting
rules comes at a cost. In general, to match the left-hand graph of a fixed rule
within a host graph requires polynomial time. To improve matching performance,
D\"orr proposed to equip rules and host graphs with distinguished root nodes.
This model was implemented by Plump and Bak, but unfortunately, is not
invertible. We address this problem by defining rootedness using a partial
function onto a two-point set rather than pointing graphs with root nodes. We
show a new result that the graph class of trees can be recognised by a rooted
GT system in linear time, given an input graph of bounded degree. Finally, we
define a new notion of confluence modulo garbage and non-garbage critical
pairs, showing it is sufficient to require strong joinability of only the
non-garbage critical pairs to establish confluence modulo garbage.
|
cs.*
|
This volume contains a selection of papers presented at Linearity/TLLA 2018:
Joint Linearity and TLLA workshops (part of FLOC 2018) held on July 7-8, 2018
in Oxford. Linearity has been a key feature in several lines of research in
both theoretical and practical approaches to computer science. On the
theoretical side there is much work stemming from linear logic dealing with
proof technology, complexity classes and more recently quantum computation. On
the practical side there is work on program analysis, expressive operational
semantics for programming languages, linear programming languages, program
transformation, update analysis and efficient implementation techniques. Linear
logic is not only a theoretical tool to analyse the use of resources in logic
and computation. It is also a corpus of tools, approaches, and methodologies
(proof nets, exponential decomposition, geometry of interaction, coherent
spaces, relational models, etc.) that were originally developed for the study
of linear logic's syntax and semantics and are nowadays applied in several
other fields.
|
cs.*
|
Finite-state tree automata are a well studied formalism for representing term
languages. This paper studies the problem of determining the regularity of the
set of instances of a finite set of terms with variables, where each variable
is restricted to instantiations of a regular set given by a tree automaton. The
problem was recently proved decidable, but with an unknown complexity. Here,
the exact complexity of the problem is determined by proving
EXPTIME-completeness. The main contribution is a new, exponential time
algorithm that performs various exponential transformations on the involved
terms and tree automata, and decides regularity by analyzing formulas over
inequality and height predicates.
|
cs.*
|
Main memory (DRAM) significantly impacts the power and energy utilization of
the overall server system. Non-Volatile Memory (NVM) devices, such as Phase
Change Memory and Spin-Transfer Torque RAM, are suitable candidates for main
memory to reduce energy consumption. But unlike DRAM, NVMs access latencies are
higher than DRAM and NVM writes are more energy sensitive than DRAM write
operations. Thus, Hybrid Main Memory Systems (HMMS) employing DRAM and NVM have
been proposed to reduce the overall energy depletion of main memory while
optimizing the performance of NVM. This paper proposes eMap, an optimal heap
memory object placement planner in HMMS. eMap considers the object-level access
patterns and energy consumption at the application level and provides an ideal
placement strategy for each object to augment performance and energy
utilization. eMap is equipped with two modules, eMPlan and eMDyn. Specifically,
eMPlan is a static placement planner which provides one time placement policies
for memory object to meet the energy budget while eMDyn is a runtime placement
planner to consider the change in energy limiting constraint during the runtime
and shuffles the memory objects by taking into account the access patterns as
well as the migration cost in terms of energy and performance. The evaluation
shows that our proposed solution satisfies both the energy limiting constraint
and the performance. We compare our methodology with the state-of-the-art
memory object classification and allocation (MOCA) framework. Our extensive
evaluation shows that our proposed solution, eMPlan meets the energy constraint
with 4.17 times less costly and reducing the energy consumption up to 14% with
the same performance. eMDyn also satisfies the performance and energy
requirement while considering the migration cost in terms of time and energy.
|
cs.*
|
Byte-addressable non-volatile memory (NVM) sitting on the memory bus is
employed to make persistent memory (PMem) in general-purpose computing systems
and embedded systems for data storage. Researchers develop software drivers
such as the block translation table (BTT) to build block devices on PMem, so
programmers can keep using mature and reliable conventional storage stack while
expecting high performance by exploiting fast PMem. However, our quantitative
study shows that BTT underutilizes PMem and yields inferior performance, due to
the absence of the imperative in-device cache. We add a conventional I/O
staging cache made of DRAM space to BTT. As DRAM and PMem have comparable
access latency, I/O staging cache is likely to be fully filled over time.
Continual cache evictions and fsyncs thus cause on-demand flushes with severe
stalls, such that the I/O staging cache is concretely unappealing for
PMem-based block devices. We accordingly propose an algorithm named Caiti with
novel I/O transit caching. Caiti eagerly evicts buffered data to PMem through
CPU's multi-cores. It also conditionally bypasses a full cache and directly
writes data into PMem to further alleviate I/O stalls. Experiments confirm that
Caiti significantly boosts the performance with BTT by up to 3.6x, without loss
of block-level write atomicity.
|
cs.*
|
Each researcher should have a full shelf---physical or virtual---of books on
writing and editing prose. Though we make no claim to any special degree of
expertise, we recently edited a book of complexity theory surveys (Complexity
Theory Retrospective II, Springer-Verlag, 1997), and in doing so we were
brought into particularly close contact with the subject of this article, and
with a number of the excellent resources available to writers and editors. In
this article, we list some of these resources, and we also relate some of the
adventures we had as our book moved from concept to reality.
|
cs.*
|
In this article, we shall describe some of the most interesting topics in the
subject of Complexity Science for a general audience. Anyone with a solid
foundation in high school mathematics (with some calculus) and an elementary
understanding of computer programming will be able to follow this article.
First, we shall explain the significance of the P versus NP problem and solve
it. Next, we shall describe two other famous mathematics problems, the Collatz
3n+1 Conjecture and the Riemann Hypothesis, and show how both Chaitin's
incompleteness theorem and Wolfram's notion of "computational irreducibility"
are important for understanding why no one has, as of yet, solved these two
problems.
|
cs.*
|
We consider the problem of computing the Euler characteristic of an abstract
simplicial complex given by its vertices and facets. We show that this problem
is #P-complete and present two new practical algorithms for computing Euler
characteristic. The two new algorithms are derived using combinatorial
commutative algebra and we also give a second description of them that requires
no algebra. We present experiments showing that the two new algorithms can be
implemented to be faster than previous Euler characteristic implementations by
a large margin.
|
cs.*
|
Read-Copy Update (RCU) is a scalable, high-performance Linux-kernel
synchronization mechanism that runs low-overhead readers concurrently with
updaters. Production-quality RCU implementations for multi-core systems are
decidedly non-trivial. Giving the ubiquity of Linux, a rare "million-year" bug
can occur several times per day across the installed base. Stringent validation
of RCU's complex behaviors is thus critically important. Exhaustive testing is
infeasible due to the exponential number of possible executions, which suggests
use of formal verification.
Previous verification efforts on RCU either focus on simple implementations
or use modeling languages, the latter requiring error-prone manual translation
that must be repeated frequently due to regular changes in the Linux kernel's
RCU implementation. In this paper, we first describe the implementation of Tree
RCU in the Linux kernel. We then discuss how to construct a model directly from
Tree RCU's source code in C, and use the CBMC model checker to verify its
safety and liveness properties. To our best knowledge, this is the first
verification of a significant part of RCU's source code, and is an important
step towards integration of formal verification into the Linux kernel's
regression test suite.
|
cs.*
|
Multi-agent reinforcement learning (MARL) has emerged as a useful approach to
solving decentralised decision-making problems at scale. Research in the field
has been growing steadily with many breakthrough algorithms proposed in recent
years. In this work, we take a closer look at this rapid development with a
focus on evaluation methodologies employed across a large body of research in
cooperative MARL. By conducting a detailed meta-analysis of prior work,
spanning 75 papers accepted for publication from 2016 to 2022, we bring to
light worrying trends that put into question the true rate of progress. We
further consider these trends in a wider context and take inspiration from
single-agent RL literature on similar issues with recommendations that remain
applicable to MARL. Combining these recommendations, with novel insights from
our analysis, we propose a standardised performance evaluation protocol for
cooperative MARL. We argue that such a standard protocol, if widely adopted,
would greatly improve the validity and credibility of future research, make
replication and reproducibility easier, as well as improve the ability of the
field to accurately gauge the rate of progress over time by being able to make
sound comparisons across different works. Finally, we release our meta-analysis
data publicly on our project website for future research on evaluation:
https://sites.google.com/view/marl-standard-protocol
|
cs.*
|
The music industry has huge troubles adapting to the new technologies. As
many pointed out, when copying music is essentially free and socially accepted
it becomes increasingly tempting for users to infringe copyrights and copy
music from one person to another. The answer of the music industry is to outlaw
a majority of citizens. This article describes how the music industry should
reinvent itself and adapt to a world where the network is ubiquitous and
exchanging information is essentially free. It relies on adapting prices to the
demand and lower costs of electronic documents in a dramatic way.
|
cs.*
|
Generalized sparse matrix-matrix multiplication is a key primitive for many
high performance graph algorithms as well as some linear solvers such as
multigrid. We present the first parallel algorithms that achieve increasing
speedups for an unbounded number of processors. Our algorithms are based on
two-dimensional block distribution of sparse matrices where serial sections use
a novel hypersparse kernel for scalability. We give a state-of-the-art MPI
implementation of one of our algorithms. Our experiments show scaling up to
thousands of processors on a variety of test scenarios.
|
cs.*
|
Generalized sparse matrix-matrix multiplication (or SpGEMM) is a key
primitive for many high performance graph algorithms as well as for some linear
solvers, such as algebraic multigrid. Here we show that SpGEMM also yields
efficient algorithms for general sparse-matrix indexing in distributed memory,
provided that the underlying SpGEMM implementation is sufficiently flexible and
scalable. We demonstrate that our parallel SpGEMM methods, which use
two-dimensional block data distributions with serial hypersparse kernels, are
indeed highly flexible, scalable, and memory-efficient in the general case.
This algorithm is the first to yield increasing speedup on an unbounded number
of processors; our experiments show scaling up to thousands of processors in a
variety of test scenarios.
|
cs.*
|
Sparse matrix-vector multiplication (spMVM) is the dominant operation in many
sparse solvers. We investigate performance properties of spMVM with matrices of
various sparsity patterns on the nVidia "Fermi" class of GPGPUs. A new "padded
jagged diagonals storage" (pJDS) format is proposed which may substantially
reduce the memory overhead intrinsic to the widespread ELLPACK-R scheme. In our
test scenarios the pJDS format cuts the overall spMVM memory footprint on the
GPGPU by up to 70%, and achieves 95% to 130% of the ELLPACK-R performance.
Using a suitable performance model we identify performance bottlenecks on the
node level that invalidate some types of matrix structures for efficient
multi-GPGPU parallelization. For appropriate sparsity patterns we extend
previous work on distributed-memory parallel spMVM to demonstrate a scalable
hybrid MPI-GPGPU code, achieving efficient overlap of communication and
computation.
|
cs.*
|
Asymmetric multicore processors (AMPs) have recently emerged as an appealing
technology for severely energy-constrained environments, especially in mobile
appliances where heterogeneity in applications is mainstream. In addition,
given the growing interest for low-power high performance computing, this type
of architectures is also being investigated as a means to improve the
throughput-per-Watt of complex scientific applications.
In this paper, we design and embed several architecture-aware optimizations
into a multi-threaded general matrix multiplication (gemm), a key operation of
the BLAS, in order to obtain a high performance implementation for ARM
big.LITTLE AMPs. Our solution is based on the reference implementation of gemm
in the BLIS library, and integrates a cache-aware configuration as well as
asymmetric--static and dynamic scheduling strategies that carefully tune and
distribute the operation's micro-kernels among the big and LITTLE cores of the
target processor. The experimental results on a Samsung Exynos 5422, a
system-on-chip with ARM Cortex-A15 and Cortex-A7 clusters that implements the
big.LITTLE model, expose that our cache-aware versions of gemm with asymmetric
scheduling attain important gains in performance with respect to its
architecture-oblivious counterparts while exploiting all the resources of the
AMP to deliver considerable energy efficiency.
|
cs.*
|
Algebraic multigrid (AMG) is often viewed as a scalable $\mathcal{O}(n)$
solver for sparse linear systems. Yet, parallel AMG lacks scalability due to
increasingly large costs associated with communication, both in the initial
construction of a multigrid hierarchy as well as the iterative solve phase.
This work introduces a parallel implementation of AMG to reduce the cost of
communication, yielding an increase in scalability. Standard inter-process
communication consists of sending data regardless of the send and receive
process locations. Performance tests show notable differences in the cost of
intra- and inter-node communication, motivating a restructuring of
communication. In this case, the communication schedule takes advantage of the
less costly intra-node communication, reducing both the number and size of
inter-node messages. Node-centric communication extends to the range of
components in both the setup and solve phase of AMG, yielding an increase in
the weak and strong scalability of the entire method.
|
cs.*
|
In this paper we demonstrate the methodology for parallelizing the
computation of large one-dimensional discrete fast Fourier transforms (DFFTs)
on multi-core Intel Xeon processors. DFFTs based on the recursive Cooley-Tukey
method have to control cache utilization, memory bandwidth and vector hardware
usage, and at the same time scale across multiple threads or compute nodes. Our
method builds on single-threaded Intel Math Kernel Library (MKL) implementation
of DFFT, and uses the Intel Cilk Plus framework for thread parallelism. We
demonstrate the ability of Intel Cilk Plus to handle parallel recursion with
nested loop-centric parallelism without tuning the code to the number of cores
or cache metrics. The result of our work is a library called EFFT that performs
1D DFTs of size 2^N for N>=21 faster than the corresponding Intel MKL parallel
DFT implementation by up to 1.5x, and faster than FFTW by up to 2.5x. The code
of EFFT is available for free download under the GPLv3 license. This work
provides a new efficient DFFT implementation, and at the same time demonstrates
an educational example of how computer science problems with complex parallel
patterns can be optimized for high performance using the Intel Cilk Plus
framework.
|
cs.*
|
News outlets are developing formats dedicated to social platforms that
capture audience attention, such as Instagram stories, Facebook Instant
articles, and YouTube videos. In some cases, these formats are created in
collaboration with the tech companies themselves. At the same time, the use of
data-driven storytelling is becoming increasingly integrated into the
ever-complex business models of news outlets, generating more impact and
visibility. Previous studies have focused on studying these two effects
separately. To address this gap in the literature, this paper identifies and
analyzes the use of data journalism on the Instagram content of AJ Labs, the
team dedicated to producing data-driven and interactive stories for the Al
Jazeera news network. Drawing upon a mixed-method approach, this study examines
the use and characteristics of data stories on social media platforms. Results
suggest that there is reliance on producing visual content that covers topics
such as politics and violence. In general, AJ Labs relies on the use of
infographics and produces its own unique data. To conclude, this paper suggests
potential ways to improve the use of Instagram to tell data stories.
|
cs.*
|
First responders and other forward deployed essential workers can benefit
from advanced analytics. Limited network access and software security
requirements prevent the usage of standard cloud based microservice analytic
platforms that are typically used in industry. One solution is to precompute a
wide range of analytics as files that can be used with standard preinstalled
software that does not require network access or additional software and can
run on a wide range of legacy hardware. In response to the COVID-19 pandemic,
this approach was tested for providing geo-spatial census data to allow quick
analysis of demographic data for better responding to emergencies. These data
were processed using the MIT SuperCloud to create several thousand Google Earth
and Microsoft Excel files representative of many advanced analytics. The fast
mapping of census data using Google Earth and Microsoft Excel has the potential
to give emergency responders a powerful tool to improve emergency preparedness.
Our approach displays relevant census data (total population, population under
15, population over 65, median age) per census block, sorted by county, through
a Microsoft Excel spreadsheet (xlsx file) and Google Earth map (kml file). The
spreadsheet interface includes features that allow users to convert between
different longitude and latitude coordinate units. For the Google Earth files,
a variety of absolute and relative colors maps of population density have been
explored to provide an intuitive and meaningful interface. Using several
hundred cores on the MIT SuperCloud, new analytics can be generated in a few
minutes.
|
cs.*
|
This paper presents Telebrain, a browser-based performatization platform
invented for organizing real-time telematic performances. Performatization is
the human performance of algorithms. When computers and humans performatize
cooperatively, the human-computer interaction (HCI) becomes the location of
computation. Novel modes of machine-human communication are necessary for
organizing performatizations. Telebrain is designed to facilitate machine-human
languages. Capitalizing on the ubiquity and cross-platform compatibility of the
Internet, Telebrain is an open-source web application supporting PerPL
(Performer Programming Language), a human-interpreted configurable language of
multi-media instructions used to program performers. Telebrain facilitates a
variety of performance disciplines such as music, theater, dance, computational
performance, networked scoring (image and audio), prompted improvisation,
real-space multi-player gaming, collaborative transdisciplinary karaoke and
quantum square-dancing. (http://telebrain.org)
|
cs.*
|
This work introduces efficient symbolic algorithms for quantitative reactive
synthesis. We consider resource-constrained robotic manipulators that need to
interact with a human to achieve a complex task expressed in linear temporal
logic. Our framework generates reactive strategies that not only guarantee task
completion but also seek cooperation with the human when possible. We model the
interaction as a two-player game and consider regret-minimizing strategies to
encourage cooperation. We use symbolic representation of the game to enable
scalability. For synthesis, we first introduce value iteration algorithms for
such games with min-max objectives. Then, we extend our method to the
regret-minimizing objectives. Our benchmarks reveal that our symbolic framework
not only significantly improves computation time (up to an order of magnitude)
but also can scale up to much larger instances of manipulation problems with up
to 2x number of objects and locations than the state of the art.
|
cs.*
|
Attention-based Neural Networks (NN) have demonstrated their effectiveness in
accurate memory access prediction, an essential step in data prefetching.
However, the substantial computational overheads associated with these models
result in high inference latency, limiting their feasibility as practical
prefetchers. To close the gap, we propose a new approach based on
tabularization that significantly reduces model complexity and inference
latency without sacrificing prediction accuracy. Our novel tabularization
methodology takes as input a distilled, yet highly accurate attention-based
model for memory access prediction and efficiently converts its expensive
matrix multiplications into a hierarchy of fast table lookups. As an exemplar
of the above approach, we develop DART, a prefetcher comprised of a simple
hierarchy of tables. With a modest 0.09 drop in F1-score, DART reduces 99.99%
of arithmetic operations from the large attention-based model and 91.83% from
the distilled model. DART accelerates the large model inference by 170x and the
distilled model by 9.4x. DART has comparable latency and storage costs as
state-of-the-art rule-based prefetcher BO but surpasses it by 6.1% in IPC
improvement. DART outperforms state-of-the-art NN-based prefetchers TransFetch
by 33.1% and Voyager by 37.2% in terms of IPC improvement, primarily due to its
low prefetching latency.
|
cs.*
|
In this paper, we present our ongoing work and initial results on the formal
specification and verification of MiniMaple (a substantial subset of Maple with
slight extensions) programs. The main goal of our work is to find behavioral
errors in such programs w.r.t. their specifications by static analysis. This
task is more complex for widely used computer algebra languages like Maple as
these are fundamentally different from classical languages: they support
non-standard types of objects such as symbols, unevaluated expressions and
polynomials and require abstract computer algebraic concepts and objects such
as rings and orderings etc. As a starting point we have defined and formalized
a syntax, semantics, type system and specification language for MiniMaple.
|
cs.*
|
Irregular applications comprise an increasingly important workload domain for
many fields, including bioinformatics, chemistry, physics, social sciences and
machine learning. Therefore, achieving high performance and energy efficiency
in the execution of emerging irregular applications is of vital importance.
This dissertation studies the root causes of inefficiency of irregular
applications in modern computing systems, and fundamentally addresses such
inefficiencies, by proposing low-overhead synchronization techniques among
parallel threads in cooperation with well-crafted data access policies.
We make four major contributions to accelerating irregular applications in
different contexts including CPU and Near-Data-Processing (NDP) (or
Processing-In-Memory (PIM)) systems. First, we design ColorTM, a novel parallel
graph coloring algorithm for CPU systems that trades off using synchronization
with lower data access costs. Second, we propose SmartPQ, an adaptive priority
queue that achieves high performance under all various contention scenarios in
Non-Uniform Memory Access CPU systems. Third, we introduce SynCron, the first
practical hardware synchronization mechanism tailored for NDP systems. Fourth,
we design SparseP, the first library for high-performance Sparse Matrix Vector
Multiplication on real PIM systems.
We demonstrate that the execution of irregular applications in CPU and
NDP/PIM architectures can be significantly accelerated by co-designing
lightweight synchronization approaches along with well-crafted data access
policies. This dissertation bridges the gap between processor-centric CPU
systems and memory-centric PIM systems in the critically-important area of
irregular applications. We hope that this dissertation inspires future work in
co-designing software algorithms with cutting-edge computing platforms to
significantly accelerate emerging irregular applications.
|
cs.*
|
The general translator formalism and computing specific implementations are
proposed. The implementation of specific elements necessary to process the
source and destination information within the translators are presented. Some
common directives or instructions, such as classes and procedures, were unified
and generalized in order to allow general translations implementations. In
order to cover general cases, two levels of processing are required, related to
the source and destination information appropriate transformations, with the
related control and processing instructions. The proposed general translator
elements are useful for processing natural or artificial information described
through any types of languages or systems.
|
cs.*
|
The development of cost-effective highperformance parallel computing on
multi-processor supercomputers makes it attractive to port excessively time
consuming simulation software from personal computers (PC) to super computes.
The power distribution system simulator (PDSS) takes a bottom-up approach and
simulates load at the appliance level, where detailed thermal models for
appliances are used. This approach works well for a small power distribution
system consisting of a few thousand appliances. When the number of appliances
increases, the simulation uses up the PC memory and its runtime increases to a
point where the approach is no longer feasible to model a practical large power
distribution system. This paper presents an effort made to port a PC-based
power distribution system simulator to a 128-processor shared-memory
supercomputer. The paper offers an overview of the parallel computing
environment and a description of the modification made to the PDSS model. The
performance of the PDSS running on a standalone PC and on the supercomputer is
compared. Future research direction of utilizing parallel computing in the
power distribution system simulation is also addressed.
|
cs.*
|
Computer-supported learning is an increasingly important form of study since
it allows for independent learning and individualized instruction. In this
paper, we discuss a novel approach to developing an intelligent tutoring system
for teaching textbook-style mathematical proofs. We characterize the
particularities of the domain and discuss common ITS design models. Our
approach is motivated by phenomena found in a corpus of tutorial dialogs that
were collected in a Wizard-of-Oz experiment. We show how an intelligent tutor
for textbook-style mathematical proofs can be built on top of an adapted
assertion-level proof assistant by reusing representations and proof search
strategies originally developed for automated and interactive theorem proving.
The resulting prototype was successfully evaluated on a corpus of tutorial
dialogs and yields good results.
|
cs.*
|
Automated Deduction in Geometry (ADG) is a forum to exchange ideas and views,
to present research results and progress, and to demonstrate software tools at
the intersection between geometry and automated deduction. Relevant topics
include (but are not limited to): polynomial algebra, invariant and
coordinate-free methods; probabilistic, synthetic, and logic approaches,
techniques for automated geometric reasoning from discrete mathematics,
combinatorics, and numerics; interactive theorem proving in geometry; symbolic
and numeric methods for geometric computation, geometric constraint solving,
automated generation/reasoning and manipulation with diagrams; design and
implementation of geometry software, automated theorem provers, special-purpose
tools, experimental studies; applications of ADG in mechanics, geometric
modelling, CAGD/CAD, computer vision, robotics and education.
Traditionally, the ADG conference is held every two years. The previous
editions of ADG were held in Nanning in 2018, Strasbourg in 2016, Coimbra in
2014, Edinburgh in 2012, Munich in 2010, Shanghai in 2008, Pontevedra in 2006,
Gainesville in 2004, Hagenberg in 2002, Zurich in 2000, Beijing in 1998, and
Toulouse in 1996. The 13th edition of ADG was supposed to be held in 2020 in
Hagenberg, Austria, but due to the COVID-19 pandemic, it was postponed for
2021, and held online (still hosted by RISC Institute, Hagenberg, Austria),
September 15-17, 2021 (https://www.risc.jku.at/conferences/adg2021).
|
cs.*
|
We advocate a domain specific software development methodology for
heterogeneous computing platforms such as Multicore CPUs, GPUs and FPGAs. We
argue that three specific benefits are realised from adopting such an approach:
portable, efficient implementations across heterogeneous platforms; domain
specific metrics of quality that characterise platforms in a form software
developers will understand; automatic, optimal partitioning across the
available computing resources. These three benefits allow a development
methodology for software developers where they describe their computational
problems in a single, easy to understand form, and after a modeling procedure
on the available resources, select how they would like to trade between various
domain specific metrics. Our work on the Forward Financial Framework ($F^3$)
demonstrates this methodology in practise. We are able to execute a range of
computational finance option pricing tasks efficiently upon a wide range of
CPU, GPU and FPGA computing platforms. We can also create accurate financial
domain metric models of walltime latency and statistical confidence.
Furthermore, we believe that we can support automatic, optimal partitioning
using this execution and modelling capability.
|
cs.*
|
In 1960s V.Geodakian proposed a theory that explains sexes as a mechanism for
evolutionary adaptation of the species to changing environmental conditions. In
2001 V.Iskrin refined and augmented the concepts of Geodakian and gave a new
and interesting explanation to several phenomena which involve sex, and sex
ratio, including the war-years phenomena. He also introduced a new concept of
the "catastrophic sex ratio." This note is an attempt to digest technical
aspects of the new ideas by Iskrin.
|
cs.*
|
More and more researchers have realized that ontologies will play a critical
role in the development of the Semantic Web, the next generation Web in which
content is not only consumable by humans, but also by software agents. The
development of tools to support ontology management including creation,
visualization, annotation, database storage, and retrieval is thus extremely
important. We have developed ImageSpace, an image ontology creation and
annotation tool that features (1) full support for the standard web ontology
language DAML+OIL; (2) image ontology creation, visualization, image annotation
and display in one integrated framework; (3) ontology consistency assurance;
and (4) storing ontologies and annotations in relational databases. It is
expected that the availability of such a tool will greatly facilitate the
creation of image repositories as islands of the Semantic Web.
|
cs.*
|
Despite its scientific, political, and practical value, comprehensive
information about human languages, in all their variety and complexity, is not
readily obtainable and searchable. One reason is that many language data are
collected as audio and video recordings which imposes a challenge to document
indexing and retrieval. Annotation of multimedia data provides an opportunity
for making the semantics explicit and facilitates the searching of multimedia
documents. We have developed OntoELAN, an ontology-based linguistic multimedia
annotator that features: (1) support for loading and displaying ontologies
specified in OWL; (2) creation of a language profile, which allows a user to
choose a subset of terms from an ontology and conveniently rename them if
needed; (3) creation of ontological tiers, which can be annotated with profile
terms and, therefore, corresponding ontological terms; and (4) saving
annotations in the XML format as Multimedia Ontology class instances and,
linked to them, class instances of other ontologies used in ontological tiers.
To our best knowledge, OntoELAN is the first audio/video annotation tool in
linguistic domain that provides support for ontology-based annotation.
|
cs.*
|
Can we do arithmetic in a completely different way, with a radically
different data structure? Could this approach provide practical benefits, like
operations on giant numbers while having an average performance similar to
traditional bitstring representations?
While answering these questions positively, our tree based representation
described in this paper comes with a few extra benefits: it compresses giant
numbers such that, for instance, the largest known prime number as well as its
related perfect number are represented as trees of small sizes. The same also
applies to Fermat numbers and important computations like exponentiation of two
become constant time operations.
At the same time, succinct representations of sparse sets, multisets and
sequences become possible through bijections to our tree-represented natural
numbers.
|
cs.*
|
This volume contains selected papers presented at the 9th International
Workshop on Reduction Strategies in Rewriting and Programming, WRS2009, which
was held in Brasilia on the 28th June 2009, associated to RTA 2009 (the 20th
International Conference on Rewriting Techniques and Applications) at RDP, the
Federated Conference on Rewriting, Deduction and Programming. Reduction
strategies define which (sub)expression(s) should be selected for evaluation
and which rule(s) should be applied. These choices affect fundamental
properties of reductions, such as completeness, laziness and efficiency in
general. The WRS workshops promote research and collaboration in the area of
reduction strategies and their applications in specification and programming,
theorem proving, software engineering, etc.
|
cs.*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.