-
Container Data Item: An Abstract Datatype for Efficient Container-based Edge Computing
Authors:
Md Rezwanur Rahman,
Tarun Annapareddy,
Shirin Ebadi,
Varsha Natarajan,
Adarsh Srinivasan,
Eric Keller,
Shivakant Mishra
Abstract:
We present Container Data Item (CDI), an abstract datatype that allows multiple containers to efficiently operate on a common data item while preserving their strong security and isolation semantics. Application developers can use CDIs to enable multiple containers to operate on the same data, synchronize execution among themselves, and control the ownership of the shared data item during runtime.…
▽ More
We present Container Data Item (CDI), an abstract datatype that allows multiple containers to efficiently operate on a common data item while preserving their strong security and isolation semantics. Application developers can use CDIs to enable multiple containers to operate on the same data, synchronize execution among themselves, and control the ownership of the shared data item during runtime. These containers may reside on the same server or different servers. CDI is designed to support microservice based applications comprised of a set of interconnected microservices, each implemented by a separate dedicated container. CDI preserves the important isolation semantics of containers by ensuring that exactly one container owns a CDI object at any instant and the ownership of a CDI object may be transferred from one container to another only by the current CDI object owner. We present three different implementations of CDI that allow different containers residing on the same server as well containers residing on different servers to use CDI for efficiently operating on a common data item. The paper provides an extensive performance evaluation of CDI along with two representative applications, an augmented reality application and a decentralized workflow orchestrator.
△ Less
Submitted 1 September, 2024;
originally announced September 2024.
-
Exploring Multimodal Large Language Models for Radiology Report Error-checking
Authors:
Jinge Wu,
Yunsoo Kim,
Eva C. Keller,
Jamie Chow,
Adam P. Levine,
Nikolas Pontikos,
Zina Ibrahim,
Paul Taylor,
Michelle C. Williams,
Honghan Wu
Abstract:
This paper proposes one of the first clinical applications of multimodal large language models (LLMs) as an assistant for radiologists to check errors in their reports. We created an evaluation dataset from real-world radiology datasets (including X-rays and CT scans). A subset of original reports was modified to contain synthetic errors by introducing three types of mistakes: "insert", "remove",…
▽ More
This paper proposes one of the first clinical applications of multimodal large language models (LLMs) as an assistant for radiologists to check errors in their reports. We created an evaluation dataset from real-world radiology datasets (including X-rays and CT scans). A subset of original reports was modified to contain synthetic errors by introducing three types of mistakes: "insert", "remove", and "substitute". The evaluation contained two difficulty levels: SIMPLE for binary error-checking and COMPLEX for identifying error types. At the SIMPLE level, our fine-tuned model significantly enhanced performance by 47.4% and 25.4% on MIMIC-CXR and IU X-ray data, respectively. This performance boost is also observed in unseen modality, CT scans, as the model performed 19.46% better than the baseline model. The model also surpassed the domain expert's accuracy in the MIMIC-CXR dataset by 1.67%. Notably, among the subsets (N=21) of the test set where a clinician did not achieve the correct conclusion, the LLaVA ensemble mode correctly identified 71.4% of these cases. However, all models performed poorly in identifying mistake types, underscoring the difficulty of the COMPLEX level. This study marks a promising step toward utilizing multimodal LLMs to enhance diagnostic accuracy in radiology. The ensemble model demonstrated comparable performance to clinicians, even capturing errors overlooked by humans.
△ Less
Submitted 3 March, 2024; v1 submitted 20 December, 2023;
originally announced December 2023.
-
Video object detection for privacy-preserving patient monitoring in intensive care
Authors:
Raphael Emberger,
Jens Michael Boss,
Daniel Baumann,
Marko Seric,
Shufan Huo,
Lukas Tuggener,
Emanuela Keller,
Thilo Stadelmann
Abstract:
Patient monitoring in intensive care units, although assisted by biosensors, needs continuous supervision of staff. To reduce the burden on staff members, IT infrastructures are built to record monitoring data and develop clinical decision support systems. These systems, however, are vulnerable to artifacts (e.g. muscle movement due to ongoing treatment), which are often indistinguishable from rea…
▽ More
Patient monitoring in intensive care units, although assisted by biosensors, needs continuous supervision of staff. To reduce the burden on staff members, IT infrastructures are built to record monitoring data and develop clinical decision support systems. These systems, however, are vulnerable to artifacts (e.g. muscle movement due to ongoing treatment), which are often indistinguishable from real and potentially dangerous signals. Video recordings could facilitate the reliable classification of biosignals using object detection (OD) methods to find sources of unwanted artifacts. Due to privacy restrictions, only blurred videos can be stored, which severely impairs the possibility to detect clinically relevant events such as interventions or changes in patient status with standard OD methods. Hence, new kinds of approaches are necessary that exploit every kind of available information due to the reduced information content of blurred footage and that are at the same time easily implementable within the IT infrastructure of a normal hospital. In this paper, we propose a new method for exploiting information in the temporal succession of video frames. To be efficiently implementable using off-the-shelf object detectors that comply with given hardware constraints, we repurpose the image color channels to account for temporal consistency, leading to an improved detection rate of the object classes. Our method outperforms a standard YOLOv5 baseline model by +1.7% mAP@.5 while also training over ten times faster on our proprietary dataset. We conclude that this approach has shown effectiveness in the preliminary experiments and holds potential for more general video OD in the future.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
ALMA reveals a stable rotating gas disk in a paradoxical low-mass, ultra-dusty galaxy at z = 4.274
Authors:
Alexandra Pope,
Jed McKinney,
Patrick Kamieneski,
Andrew Battisti,
Itziar Aretxaga,
Gabriel Brammer,
Jose M. Diego,
David H. Hughes,
Erica Keller,
Danilo Marchesini,
Andrew Mizener,
Alfredo Montana,
Eric Murphy,
Katherine E. Whitaker,
Grant Wilson,
Min Yun
Abstract:
We report ALMA detections of [CII] and dust continuum in Az9, a multiply-imaged galaxy behind the Frontier Field cluster MACSJ0717.5+3745. The bright [CII] emission line provides a spectroscopic redshift of z = 4.274. This strongly lensed (mu = 7 +/- 1) galaxy has an intrinsic stellar mass of only 2e9 Msun and a total star formation rate of 26 Msun/yr (~80% of which is dust obscured). Using public…
▽ More
We report ALMA detections of [CII] and dust continuum in Az9, a multiply-imaged galaxy behind the Frontier Field cluster MACSJ0717.5+3745. The bright [CII] emission line provides a spectroscopic redshift of z = 4.274. This strongly lensed (mu = 7 +/- 1) galaxy has an intrinsic stellar mass of only 2e9 Msun and a total star formation rate of 26 Msun/yr (~80% of which is dust obscured). Using public magnification maps, we reconstruct the [CII] emission in the source plane to reveal a stable, rotation-dominated disk with V/sigma = 5.3, which is > 2x higher than predicted from simulations for similarly high-redshift, low-mass galaxies. In the source plane, the [CII] disk has a half-light radius of 1.8 kpc and, along with the dust, is spatially offset from the peak of the stellar light by 1.4 kpc. Az9 is not deficient in [CII]; L[CII]/LIR = 0.0027 consistent with local and high redshift normal star forming galaxies. While dust-obscured star formation is expected to dominate in higher mass galaxies, such a large reservoir of dust and gas in a lower mass disk galaxy 1.4 Gyr after the Big Bang challenges our picture of early galaxy evolution. Furthermore, the prevalence of such low-mass dusty galaxies has important implications for the selection of the highest redshift dropout galaxies with JWST. As one of the lowest stellar mass galaxies at z > 4 to be detected in dust continuum and [CII], Az9 is an excellent laboratory in which to study early dust enrichment in the interstellar medium.
△ Less
Submitted 17 June, 2023;
originally announced June 2023.
-
Computer-Aided Design as Language
Authors:
Yaroslav Ganin,
Sergey Bartunov,
Yujia Li,
Ethan Keller,
Stefano Saliceti
Abstract:
Computer-Aided Design (CAD) applications are used in manufacturing to model everything from coffee mugs to sports cars. These programs are complex and require years of training and experience to master. A component of all CAD models particularly difficult to make are the highly structured 2D sketches that lie at the heart of every 3D construction. In this work, we propose a machine learning model…
▽ More
Computer-Aided Design (CAD) applications are used in manufacturing to model everything from coffee mugs to sports cars. These programs are complex and require years of training and experience to master. A component of all CAD models particularly difficult to make are the highly structured 2D sketches that lie at the heart of every 3D construction. In this work, we propose a machine learning model capable of automatically generating such sketches. Through this, we pave the way for developing intelligent tools that would help engineers create better designs with less effort. Our method is a combination of a general-purpose language modeling technique alongside an off-the-shelf data serialization protocol. We show that our approach has enough flexibility to accommodate the complexity of the domain and performs well for both unconditional synthesis and image-to-sketch translation.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
Infinity: A Scalable Infrastructure for In-Network Applications
Authors:
Marcelo Abranches,
Karl Olson,
Eric Keller
Abstract:
Network programmability is an area of research both defined by its potential and its current limitations. While programmable hardware enables customization of device operation, tailoring processing to finely tuned objectives, limited resources stifle much of the capability and scalability desired for future technologies. Current solutions to overcome these limitations simply shift the problem, tem…
▽ More
Network programmability is an area of research both defined by its potential and its current limitations. While programmable hardware enables customization of device operation, tailoring processing to finely tuned objectives, limited resources stifle much of the capability and scalability desired for future technologies. Current solutions to overcome these limitations simply shift the problem, temporarily offloading memory needs or processing to other systems while incurring both round-trip time and complexity costs. To overcome these unnecessary costs, we introduce Infinity, a resource disaggregation method to move processing to capable devices while continuing to forward as the original owner, limiting unnecessary buffering and round-trip processing. By forwarding both the processing need and associated data simultaneously we are able to scale operation with minimal overhead and delay, improving both capability and performance objectives for in-network processing.
△ Less
Submitted 25 March, 2021;
originally announced March 2021.
-
Improving ALMA's data processing effciency using a holistic approach
Authors:
Theodoros Nakos,
Harold Francke,
Kouichiro Nakanishi,
Dirk Petry,
Thomas Stanke,
Catarina Ubach,
Luciano Cerrigone,
Erica Keller,
Alfonso Trejo,
Junko Ueda
Abstract:
ALMA (Atacama Large Millimeter/submillimeter Array) is the world's largest ground-based facility for observations in the millimeter/submillimeter regime. One of ALMA's outstanding characteristics is the large effort dedicated to the quality assurance (QA) of the calibrated and imaged data products offered to the astronomical community. The Data Management Group (DMG), in charge of the data process…
▽ More
ALMA (Atacama Large Millimeter/submillimeter Array) is the world's largest ground-based facility for observations in the millimeter/submillimeter regime. One of ALMA's outstanding characteristics is the large effort dedicated to the quality assurance (QA) of the calibrated and imaged data products offered to the astronomical community. The Data Management Group (DMG), in charge of the data processing, review, and delivery of the ALMA data, consists of approximately 60 experts in data reduction, from the ALMA Regional Centers (ARCs) and the Joint ALMA Observatory (JAO), distributed in fourteen countries. With a throughput of more than 3,000 datasets per year, meeting the goal of delivering the pipeline-able data products within 30 days after data acquisition is a huge challenge.
This paper presents (a) the history of data processing at ALMA, (b) the challenges our team had and is still facing, (c) the methodology followed to mitigate the operational risks, (d) the ongoing optimization initiatives, (e) the current data processing status, (f) the strategy which is being followed so that, in a few Cycles from now, a team of approximately 10 data reducers (DRs) at JAO can process and review some 80% of the datasets collected during an observing cycle, and, finally, (g) the important role of the ARCs for processing the remaining datasets.
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
General Domain Adaptation Through Proportional Progressive Pseudo Labeling
Authors:
Mohammad J. Hashemi,
Eric Keller
Abstract:
Domain adaptation helps transfer the knowledge gained from a labeled source domain to an unlabeled target domain. During the past few years, different domain adaptation techniques have been published. One common flaw of these approaches is that while they might work well on one input type, such as images, their performance drops when applied to others, such as text or time-series. In this paper, w…
▽ More
Domain adaptation helps transfer the knowledge gained from a labeled source domain to an unlabeled target domain. During the past few years, different domain adaptation techniques have been published. One common flaw of these approaches is that while they might work well on one input type, such as images, their performance drops when applied to others, such as text or time-series. In this paper, we introduce Proportional Progressive Pseudo Labeling (PPPL), a simple, yet effective technique that can be implemented in a few lines of code to build a more general domain adaptation technique that can be applied on several different input types. At the beginning of the training phase, PPPL progressively reduces target domain classification error, by training the model directly with pseudo-labeled target domain samples, while excluding samples with more likely wrong pseudo-labels from the training set and also postponing training on such samples. Experiments on 6 different datasets that include tasks such as anomaly detection, text sentiment analysis and image classification demonstrate that PPPL can beat other baselines and generalize better.
△ Less
Submitted 23 December, 2020;
originally announced December 2020.
-
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
Authors:
Mohammad J. Hashemi,
Eric Keller
Abstract:
The increase of cyber attacks in both the numbers and varieties in recent years demands to build a more sophisticated network intrusion detection system (NIDS). These NIDS perform better when they can monitor all the traffic traversing through the network like when being deployed on a Software-Defined Network (SDN). Because of the inability to detect zero-day attacks, signature-based NIDS which we…
▽ More
The increase of cyber attacks in both the numbers and varieties in recent years demands to build a more sophisticated network intrusion detection system (NIDS). These NIDS perform better when they can monitor all the traffic traversing through the network like when being deployed on a Software-Defined Network (SDN). Because of the inability to detect zero-day attacks, signature-based NIDS which were traditionally used for detecting malicious traffic are beginning to get replaced by anomaly-based NIDS built on neural networks. However, recently it has been shown that such NIDS have their own drawback namely being vulnerable to the adversarial example attack. Moreover, they were mostly evaluated on the old datasets which don't represent the variety of attacks network systems might face these days. In this paper, we present Reconstruction from Partial Observation (RePO) as a new mechanism to build an NIDS with the help of denoising autoencoders capable of detecting different types of network attacks in a low false alert setting with an enhanced robustness against adversarial example attack. Our evaluation conducted on a dataset with a variety of network attacks shows denoising autoencoders can improve detection of malicious traffic by up to 29% in a normal setting and by up to 45% in an adversarial setting compared to other recently proposed anomaly detectors.
△ Less
Submitted 9 August, 2020;
originally announced August 2020.
-
CO Emission in Infrared-Selected Active Galactic Nuclei
Authors:
Allison Kirkpatrick,
Chelsea Sharon,
Erica Keller,
Alexandra Pope
Abstract:
In order to better understand how active galactic nuclei (AGN) effect the interstellar media of their host galaxies, we perform a meta-analysis of the CO emission for a sample of $z=0.01-4$ galaxies from the literature with existing CO detections and well-constrained AGN contributions to the infrared (67 galaxies). Using either Spitzer/IRS mid-IR spectroscopy or Spitzer+Herschel colors we determin…
▽ More
In order to better understand how active galactic nuclei (AGN) effect the interstellar media of their host galaxies, we perform a meta-analysis of the CO emission for a sample of $z=0.01-4$ galaxies from the literature with existing CO detections and well-constrained AGN contributions to the infrared (67 galaxies). Using either Spitzer/IRS mid-IR spectroscopy or Spitzer+Herschel colors we determine the fraction of the infrared luminosity in each galaxy that can be attributed to heating by the AGN or stars. We calculate new average CO spectral line ratios (primarily from Carilli \& Walter 2013) to uniformly scale the higher-$J$ CO detections to the ground state and accurately determine our sample's molecular gas masses. We do not find significant differences in the gas depletion timescales/star formation efficiencies (SFEs) as a function of the mid-infrared AGN strength ($f_{\rm AGN}({\rm MIR})$ or $L_{\rm IR} ({\rm AGN})$), which indicates that the presence of an IR-bright AGN is not a sufficient sign-post of galaxy quenching. We also find that the dust-to-gas ratio is consistent for all sources, regardless of AGN emission, redshift, or $L_{\rm IR}$, indicating that dust is likely a reliable tracer of gas mass for massive dusty galaxies (albeit with a large degree of scatter). Lastly, if we classify galaxies as either AGN or star formation dominated, we do not find a robust statistically significant difference between their CO excitation.
△ Less
Submitted 16 May, 2019;
originally announced May 2019.
-
Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses
Authors:
Mohammad Hashemi,
Greg Cusack,
Eric Keller
Abstract:
It has been shown that adversaries can craft example inputs to neural networks which are similar to legitimate inputs but have been created to purposely cause the neural network to misclassify the input. These adversarial examples are crafted, for example, by calculating gradients of a carefully defined loss function with respect to the input. As a countermeasure, some researchers have tried to de…
▽ More
It has been shown that adversaries can craft example inputs to neural networks which are similar to legitimate inputs but have been created to purposely cause the neural network to misclassify the input. These adversarial examples are crafted, for example, by calculating gradients of a carefully defined loss function with respect to the input. As a countermeasure, some researchers have tried to design robust models by blocking or obfuscating gradients, even in white-box settings. Another line of research proposes introducing a separate detector to attempt to detect adversarial examples. This approach also makes use of gradient obfuscation techniques, for example, to prevent the adversary from trying to fool the detector. In this paper, we introduce stochastic substitute training, a gray-box approach that can craft adversarial examples for defenses which obfuscate gradients. For those defenses that have tried to make models more robust, with our technique, an adversary can craft adversarial examples with no knowledge of the defense. For defenses that attempt to detect the adversarial examples, with our technique, an adversary only needs very limited information about the defense to craft adversarial examples. We demonstrate our technique by applying it against two defenses which make models more robust and two defenses which detect adversarial examples.
△ Less
Submitted 23 October, 2018;
originally announced October 2018.
-
Elasticizing Linux via Joint Disaggregation of Memory and Computation
Authors:
Ehab Ababneh,
Zaid Al-Ali,
Sangtae Ha,
Richard Han,
Eric Keller
Abstract:
In this paper, we propose a set of operating system primitives which provides a scaling abstraction to cloud applications in which they can transparently be enabled to support scaled execution across multiple physical nodes as resource needs go beyond that available on a single machine. These primitives include stretch, to extend the address space of an application to a new node, push and pull, to…
▽ More
In this paper, we propose a set of operating system primitives which provides a scaling abstraction to cloud applications in which they can transparently be enabled to support scaled execution across multiple physical nodes as resource needs go beyond that available on a single machine. These primitives include stretch, to extend the address space of an application to a new node, push and pull, to move pages between nodes as needed for execution and optimization, and jump, to transfer execution in a very lightweight manner between nodes. This joint disaggregation of memory and computing allows for transparent elasticity, improving an application's performance by capitalizing on the underlying dynamic infrastructure without needing an application re-write. We have implemented these primitives in a Linux 2.6 kernel, collectively calling the extended operating system, ElasticOS. Our evaluation across a variety of algorithms shows up to 10x improvement in performance over standard network swap.
△ Less
Submitted 3 June, 2018;
originally announced June 2018.
-
Not to Cry Wolf: Distantly Supervised Multitask Learning in Critical Care
Authors:
Patrick Schwab,
Emanuela Keller,
Carl Muroi,
David J. Mack,
Christian Strässle,
Walter Karlen
Abstract:
Patients in the intensive care unit (ICU) require constant and close supervision. To assist clinical staff in this task, hospitals use monitoring systems that trigger audiovisual alarms if their algorithms indicate that a patient's condition may be worsening. However, current monitoring systems are extremely sensitive to movement artefacts and technical errors. As a result, they typically trigger…
▽ More
Patients in the intensive care unit (ICU) require constant and close supervision. To assist clinical staff in this task, hospitals use monitoring systems that trigger audiovisual alarms if their algorithms indicate that a patient's condition may be worsening. However, current monitoring systems are extremely sensitive to movement artefacts and technical errors. As a result, they typically trigger hundreds to thousands of false alarms per patient per day - drowning the important alarms in noise and adding to the exhaustion of clinical staff. In this setting, data is abundantly available, but obtaining trustworthy annotations by experts is laborious and expensive. We frame the problem of false alarm reduction from multivariate time series as a machine-learning task and address it with a novel multitask network architecture that utilises distant supervision through multiple related auxiliary tasks in order to reduce the number of expensive labels required for training. We show that our approach leads to significant improvements over several state-of-the-art baselines on real-world ICU data and provide new insights on the importance of task selection and architectural choices in distantly supervised multitask learning.
△ Less
Submitted 7 June, 2018; v1 submitted 14 February, 2018;
originally announced February 2018.
-
FluidMem: Memory as a Service for the Datacenter
Authors:
Blake Caldwell,
Youngbin Im,
Sangtae Ha,
Richard Han,
Eric Keller
Abstract:
Disaggregating resources in data centers is an emerging trend. Recent work has begun to explore memory disaggregation, but suffers limitations including lack of consideration of the complexity of cloud-based deployment, including heterogeneous hardware and APIs for cloud users and operators. In this paper, we present FluidMem, a complete system to realize disaggregated memory in the datacenter. Go…
▽ More
Disaggregating resources in data centers is an emerging trend. Recent work has begun to explore memory disaggregation, but suffers limitations including lack of consideration of the complexity of cloud-based deployment, including heterogeneous hardware and APIs for cloud users and operators. In this paper, we present FluidMem, a complete system to realize disaggregated memory in the datacenter. Going beyond simply demonstrating remote memory is possible, we create an entire Memory as a Service. We define the requirements of Memory as a Service and build its implementation in Linux as FluidMem. We present a performance analysis of FluidMem and demonstrate that it transparently supports remote memory for standard applications such as MongoDB and genome sequencing applications.
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
Early Science with the Large Millimeter Telescope: Detection of dust emission in multiple images of a normal galaxy at $z>4$ lensed by a Frontier Fields cluster
Authors:
Alexandra Pope,
Alfredo Montana,
Andrew Battisti,
Marceau Limousin,
Danilo Marchesini,
Grant W. Wilson,
Stacey Alberts,
Itziar Aretxaga,
Vladimir Avila-Reese,
Jose Ramon Bermejo-Climent,
Gabriel Brammer,
Hector Bravo-Alfaro,
Daniela Calzetti,
Ranga-Ram Chary,
Ryan Cybulski,
Mauro Giavalisco,
David Hughes,
Erin Kado-Fong,
Erica Keller,
Allison Kirkpatrick,
Ivo Labbe,
Daniel Lange-Vagle,
James Lowenthal,
Eric Murphy,
Pascal Oesch
, et al. (10 additional authors not shown)
Abstract:
We directly detect dust emission in an optically-detected, multiply-imaged galaxy lensed by the Frontier Fields cluster MACSJ0717.5+3745. We detect two images of the same galaxy at 1.1mm with the AzTEC camera on the Large Millimeter Telescope leaving no ambiguity in the counterpart identification. This galaxy, MACS071_Az9, is at z>4 and the strong lensing model (mu=7.5) allows us to calculate an i…
▽ More
We directly detect dust emission in an optically-detected, multiply-imaged galaxy lensed by the Frontier Fields cluster MACSJ0717.5+3745. We detect two images of the same galaxy at 1.1mm with the AzTEC camera on the Large Millimeter Telescope leaving no ambiguity in the counterpart identification. This galaxy, MACS071_Az9, is at z>4 and the strong lensing model (mu=7.5) allows us to calculate an intrinsic IR luminosity of 9.7e10 Lsun and an obscured star formation rate of 14.6 +/- 4.5 Msun/yr. The unobscured star formation rate from the UV is only 4.1 +/- 0.3 Msun/yr which means the total star formation rate (18.7 +/- 4.5 Msun/yr) is dominated (75-80%) by the obscured component. With an intrinsic stellar mass of only 6.9e9Msun, MACS0717_Az9 is one of only a handful of z>4 galaxies at these lower masses that is detected in dust emission. This galaxy lies close to the estimated star formation sequence at this epoch. However, it does not lie on the dust obscuration relation (IRX-beta) for local starburst galaxies and is instead consistent with the Small Magellanic Cloud (SMC) attenuation law. This remarkable lower mass galaxy showing signs of both low metallicity and high dust content may challenge our picture of dust production in the early Universe.
△ Less
Submitted 13 March, 2017;
originally announced March 2017.
-
Applying Operating System Principles to SDN Controller Design
Authors:
Matthew Monaco,
Oliver Michel,
Eric Keller
Abstract:
Rather than creating yet another network controller which provides a framework in a specific (potentially new) programming language and runs as a monolithic application, in this paper we extend an existing operating system and leverage its software ecosystem in order to serve as a practical SDN controller. This paper introduces yanc, a controller platform for software-defined networks which expose…
▽ More
Rather than creating yet another network controller which provides a framework in a specific (potentially new) programming language and runs as a monolithic application, in this paper we extend an existing operating system and leverage its software ecosystem in order to serve as a practical SDN controller. This paper introduces yanc, a controller platform for software-defined networks which exposes the network configuration and state as a file system, enabling user and system applications to interact through standard file I/O, and to easily take advantage of the tools available on the host operating system. In yanc, network applications are separate processes, are provided by multiple sources, and may be written in any language. Applications benefit from common and powerful technologies such as the virtual file system (VFS) layer, which we leverage to layer a distributed file system on top of, and Linux namespaces, which we use to isolate applications with different views (e.g., slices). In this paper we present the goals and design of yanc. Our initial prototype is built with the FUSE file system in user space on Linux and has been demonstrated with a simple static flow pusher application. Effectively, we are making Linux the network operating system.
△ Less
Submitted 16 October, 2015;
originally announced October 2015.
-
Quality of Consumption: The Friendlier Side of Quality of Service
Authors:
Murad Kablan,
Hani Jamjoom,
Eric Keller
Abstract:
Cloud services today are increasingly built using functionality from other running services. In this paper, we question whether legacy Quality of Services (QoS) metrics and enforcement techniques are sufficient as they are producer centric. We argue that, similar to customer rating systems found in banking systems and many sharing economy apps (e.g., Uber and Airbnb), Quality of Consumption (QoC)…
▽ More
Cloud services today are increasingly built using functionality from other running services. In this paper, we question whether legacy Quality of Services (QoS) metrics and enforcement techniques are sufficient as they are producer centric. We argue that, similar to customer rating systems found in banking systems and many sharing economy apps (e.g., Uber and Airbnb), Quality of Consumption (QoC) should be introduced to capture different metrics about service consumers. We show how the combination of QoS and QoC, dubbed QoX, can be used by consumers and providers to improve the security and management of their infrastructure. In addition, we demonstrate how sharing information among other consumers and providers increase the value of QoX. To address the main challenge with sharing information, namely sybil attacks and mis-information, we describe how we can leverage cloud providers as vouching authorities to ensure the integrity of information. We present initial results in prototyping the appropriate abstractions and interfaces in a cloud environment, focusing on the design impact on both service providers and consumers.
△ Less
Submitted 30 September, 2015;
originally announced September 2015.
-
The Cloud Needs a Reputation System
Authors:
Murad Kablan,
Carlee Joe-Won,
Sangtae Ha,
Hani Jamjoom,
Eric Keller
Abstract:
Today's cloud apps are built from many diverse services that are managed by different parties. At the same time, these parties, which consume and/or provide services, continue to rely on arcane static security and entitlements models. In this paper, we introduce Seit, an inter-tenant framework that manages the interactions between cloud services. Seit is a software-defined reputation-based framewo…
▽ More
Today's cloud apps are built from many diverse services that are managed by different parties. At the same time, these parties, which consume and/or provide services, continue to rely on arcane static security and entitlements models. In this paper, we introduce Seit, an inter-tenant framework that manages the interactions between cloud services. Seit is a software-defined reputation-based framework. It consists of two primary components: (1) a set of integration and query interfaces that can be easily integrated into cloud and service providers' management stacks, and (2) a controller that maintains reputation information using a mechanism that is adaptive to the highly dynamic environment of the cloud. We have fully implemented Seit, and integrated it into an SDN controller, a load balancer, a cloud service broker, an intrusion detection system, and a monitoring framework. We evaluate the efficacy of Seit using both an analytical model and a Mininet-based emulated environment. Our analytical model validate the isolation and stability properties of Seit. Using our emulated environment, we show that Seit can provide improved security by isolating malicious tenants, reduced costs by adapting the infrastructure without compromising security, and increased revenues for high quality service providers by enabling reputation to impact discovery.
△ Less
Submitted 30 September, 2015;
originally announced September 2015.
-
Toward Complete Statistics of Massive Binary Stars: Penultimate Results from the Cygnus OB2 Radial Velocity Survey
Authors:
Henry A. Kobulnicky,
Daniel C. Kiminki,
Michael J. Lundquist,
Jamison Burke,
James Chapman,
Erica Keller,
Kathryn Lester,
Emily K. Rolen,
Eric Topel,
Anirban Bhattacharjee,
Rachel A. Smullen,
Carlos A. Vargas Alvarez,
Jessie C. Runnoe,
Daniel A. Dale,
Michael M. Brotherton
Abstract:
We analyze orbital solutions for 48 massive multiple-star systems in the Cygnus OB2 Association, 23 of which are newly presented here, to find that the observed distribution of orbital periods is approximately uniform in log P for P<45 d, but it is not scale-free. Inflections in the cumulative distribution near 6 d, 14, d, and 45 d, suggest key physical scales of ~0.2, ~0.4, and ~1 A.U. where yet-…
▽ More
We analyze orbital solutions for 48 massive multiple-star systems in the Cygnus OB2 Association, 23 of which are newly presented here, to find that the observed distribution of orbital periods is approximately uniform in log P for P<45 d, but it is not scale-free. Inflections in the cumulative distribution near 6 d, 14, d, and 45 d, suggest key physical scales of ~0.2, ~0.4, and ~1 A.U. where yet-to-be-identified phenomena create distinct features. No single power law provides a statistically compelling prescription, but if features are ignored, a power law with exponent beta = -0.22 provides a crude approximation over P=1.4 -- 2000 d, as does a piece-wise linear function with a break near 45 d. The cumulative period distribution flattens at P > 45 d, even after correction for completeness, indicating either a lower binary fraction or a shift toward low-mass companions. A high degree of similarity (91% likelihood) between the Cyg OB2 period distribution and that of other surveys suggests that the binary properties at P<25 d are determined by local physics of disk/clump fragmentation and are relatively insensitive to environmental and evolutionary factors. Fully 30% of the unbiased parent sample is a binary with period P < 45 d. Completeness corrections imply a binary fraction near 55% for P < 5000 d. The observed distribution of mass ratios 0.2<q<1 is consistent with uniform, while the observed distribution of eccentricities 0.1<e<0.6 is consistent with uniform plus an excess of e ~ 0 systems. We identify six stars, all supergiants, that exhibit aperiodic velocity variations of ~30 km/s attributed to atmospheric fluctuations.
△ Less
Submitted 25 June, 2014;
originally announced June 2014.
-
Quantum interference by two temporally distinguishable pulses
Authors:
Yoon-Ho Kim,
Maria V. Chekhova,
Sergei P. Kulik,
Yanhua Shih,
Timothy E. Keller,
Morton H. Rubin
Abstract:
We report a two-photon interference effect, in which the entangled photon pairs are generated from two laser pulses well-separated in time. In a single pump pulse case, interference effects did not occur in our experimental scheme. However, by introducing a second pump pulse delayed in time, quantum interference was then observed. The visibility of the interference fringes shows dependence on th…
▽ More
We report a two-photon interference effect, in which the entangled photon pairs are generated from two laser pulses well-separated in time. In a single pump pulse case, interference effects did not occur in our experimental scheme. However, by introducing a second pump pulse delayed in time, quantum interference was then observed. The visibility of the interference fringes shows dependence on the delay time between two laser pulses. The results are explained in terms of indistinguishability of biphoton amplitudes which originated from two temporally separated laser pulses.
△ Less
Submitted 6 April, 1999; v1 submitted 12 March, 1999;
originally announced March 1999.