Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 88 results for author: Morrison, A

.
  1. Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)

    Authors: Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas

    Abstract: Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled, quiescent local environments. Hence, it is unclear whether such attacks are feasible in a production cloud environment. In the cloud, side channels are flooded with noise from activities of other tenants and, in Function-as-a-Service (FaaS) workloads, the attacker has a very limited time window to mount the a… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Journal ref: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2024), Volume 2, pages 582-600, La Jolla, CA, USA, May 2024

  2. arXiv:2403.07387  [pdf, ps, other

    math.CO

    Combinatorics of generalized parking-function polytopes

    Authors: Margaret M. Bayer, Steffen Borgwardt, Teressa Chambers, Spencer Daugherty, Aleyah Dawkins, Danai Deligeorgaki, Hsin-Chieh Liao, Tyrrell McAllister, Angela Morrison, Garrett Nelson, Andrés R. Vindas-Meléndez

    Abstract: For $\mathbf{b}=(b_1,\dots,b_n)\in \mathbb{Z}_{>0}^n$, a $\mathbf{b}$-parking function is defined to be a sequence $(β_1,\dots,β_n)$ of positive integers whose nondecreasing rearrangement $β'_1\leq β'_2\leq \cdots \leq β'_n$ satisfies $β'_i\leq b_1+\cdots + b_i$. The $\mathbf{b}$-parking-function polytope $\mathfrak{X}_n(\mathbf{b})$ is the convex hull of all $\mathbf{b}$-parking functions of leng… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 27 pages, 4 figures, Comments welcomed!

    MSC Class: 05A10; 05A15; 05A19; 52B05; 52B11; 52B15; 52B20; 52B40;

  3. arXiv:2401.06942  [pdf, other

    quant-ph cond-mat.mes-hall

    Role of Oxygen in Laser Induced Contamination at Diamond-Vacuum Interfaces

    Authors: Shreyas Parthasarathy, Maxime Joos, Lillian B. Hughes, Simon A. Meynell, Taylor A. Morrison, J. D. Risner-Jamtgaard, David M. Weld, Kunal Mukherjee, Ania C. Bleszynski Jayich

    Abstract: Many modern-day quantum science experiments rely on high-fidelity measurement of fluorescent signals emitted by the quantum system under study. A pernicious issue encountered when such experiments are conducted near a material interface in vacuum is "laser-induced contamination" (LIC): the gradual accretion of fluorescent contaminants on the surface where a laser is focused. Fluorescence from thes… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Comments: 22 pages, 10 figures

  4. arXiv:2401.03044  [pdf, other

    cond-mat.mes-hall

    Machine learning inspired models for Hall effects in non-collinear magnets

    Authors: Jonathan Kipp, Fabian R. Lux, Thorben Pürling, Abigail Morrison, Stefan Blügel, Daniele Pinna, Yuriy Mokrousov

    Abstract: The anomalous Hall effect has been front and center in solid state research and material science for over a century now, and the complex transport phenomena in nontrivial magnetic textures have gained an increasing amount of attention, both in theoretical and experimental studies. However, a clear path forward to capturing the influence of magnetization dynamics on anomalous Hall effect even in sm… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: 19 pages, 15 figures

  5. arXiv:2312.12388  [pdf, ps, other

    math.OC

    On Combinatorial Network Flows Algorithms and Circuit Augmentation for Pseudoflows

    Authors: Steffen Borgwardt, Angela Morrison

    Abstract: There is a wealth of combinatorial algorithms for classical min-cost flow problems and their simpler variants like max flow or shortest path problems. It is well-known that many of these algorithms are related to the Simplex method and the more general circuit augmentation schemes: prime examples are the network Simplex method, a refinement of the primal Simplex method, and min-mean cycle cancelin… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    MSC Class: 52B05; 90C05; 90C08; 90C90

  6. DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version)

    Authors: Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher

    Abstract: Speculative execution attacks undermine the security of constant-time programming, the standard technique used to prevent microarchitectural side channels in security-sensitive software such as cryptographic code. Constant-time code must therefore also deploy a defense against speculative execution attacks to prevent leakage of secret data stored in memory or the processor registers. Unfortunately… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Journal ref: In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23). Association for Computing Machinery, New York, NY, USA, 2053-2067

  7. arXiv:2311.14079  [pdf, other

    cs.LG stat.ML

    Empirical Comparison between Cross-Validation and Mutation-Validation in Model Selection

    Authors: Jinyang Yu, Sami Hamdan, Leonard Sasse, Abigail Morrison, Kaustubh R. Patil

    Abstract: Mutation validation (MV) is a recently proposed approach for model selection, garnering significant interest due to its unique characteristics and potential benefits compared to the widely used cross-validation (CV) method. In this study, we empirically compared MV and $k$-fold CV using benchmark and real-world datasets. By employing Bayesian tests, we compared generalization estimates yielding th… ▽ More

    Submitted 15 February, 2024; v1 submitted 23 November, 2023; originally announced November 2023.

  8. arXiv:2306.09855  [pdf, other

    q-bio.NC cs.NE

    Runtime Construction of Large-Scale Spiking Neuronal Network Models on GPU Devices

    Authors: Bruno Golosio, Jose Villamar, Gianmarco Tiddia, Elena Pastorelli, Jonas Stapmanns, Viviana Fanti, Pier Stanislao Paolucci, Abigail Morrison, Johanna Senk

    Abstract: Simulation speed matters for neuroscientific research: this includes not only how quickly the simulated model time of a large-scale spiking neuronal network progresses, but also how long it takes to instantiate the network model in computer memory. On the hardware side, acceleration via highly parallel GPUs is being increasingly utilized. On the software side, code generation approaches ensure hig… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: 29 pages, 9 figures

    Journal ref: Appl. Sci. 2023, 13(17), 9598

  9. Women's participation in mathematics in Scotland, 1730-1850

    Authors: Amie Morrison, Isobel Falconer

    Abstract: The eighteenth century saw a flourishing of scientific and philosophical thought throughout Scotland, known as the Scottish Enlightenment. The accomplishments of prominent male figures of this period have been well documented in all disciplines. However, studies of women's experiences are relatively sparse. This paper partially corrects this oversight by drawing together evidence for women's parti… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: 22 pages

    MSC Class: 01A50 (primary) 01A55 (secondary)

    Journal ref: British Journal for the History of Mathematics 37 (2022) 2-23

  10. arXiv:2306.04602  [pdf, other

    cs.CR

    Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)

    Authors: Adi Kaufman, Moshik Hershcovitch, Adam Morrison

    Abstract: Key-value stores typically leave access control to the systems for which they act as storage engines. Unfortunately, attackers may circumvent such read access controls via timing attacks on the key-value store, which use differences in query response times to glean information about stored data. To date, key-value store timing attacks have aimed to disclose stored values and have exploited exter… ▽ More

    Submitted 8 September, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: Full version of USENIX ATC'23 paper

  11. arXiv:2305.02311  [pdf, ps, other

    quant-ph physics.ins-det

    JaqalPaw: A Guide to Defining Pulses and Waveforms for Jaqal

    Authors: Daniel Lobser, Joshua Goldberg, Andrew J. Landahl, Peter Maunz, Benjamin C. A. Morrison, Kenneth Rudinger, Antonio Russo, Brandon Ruzic, Daniel Stick, Jay Van Der Wall, Susan M. Clark

    Abstract: One of the many challenges of developing an open user testbed such as QSCOUT is providing an interface that maintains simplicity without compromising expressibility or control. This interface comprises two distinct elements: a quantum assembly language designed for specifying quantum circuits at the gate level, and a low-level counterpart used for describing gates in terms of waveforms that realiz… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: Originally published April 2021 at qscout.sandia.gov

  12. arXiv:2305.01656  [pdf, other

    cs.HC cs.LG cs.LO

    Probabilistic Formal Modelling to Uncover and Interpret Interaction Styles

    Authors: Oana Andrei, Muffy Calder, Matthew Chalmers, Alistair Morrison

    Abstract: We present a study using new computational methods, based on a novel combination of machine learning for inferring admixture hidden Markov models and probabilistic model checking, to uncover interaction styles in a mobile app. These styles are then used to inform a redesign, which is implemented, deployed, and then analysed using the same methods. The data sets are logged user traces, collected ov… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

  13. arXiv:2212.08484  [pdf, other

    cs.NE cs.MA

    Emergent communication enhances foraging behaviour in evolved swarms controlled by Spiking Neural Networks

    Authors: Cristian Jimenez Romero, Alper Yegenoglu, Aarón Pérez Martín, Sandra Diaz-Pier, Abigail Morrison

    Abstract: Social insects such as ants communicate via pheromones which allows them to coordinate their activity and solve complex tasks as a swarm, e.g. foraging for food. This behavior was shaped through evolutionary processes. In computational models, self-coordination in swarms has been implemented using probabilistic or simple action rules to shape the decision of each agent and the collective behavior.… ▽ More

    Submitted 8 September, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: 27 pages, 16 figures

  14. arXiv:2212.05354  [pdf, other

    q-bio.NC cs.NE

    Phenomenological modeling of diverse and heterogeneous synaptic dynamics at natural density

    Authors: Agnes Korcsak-Gorzo, Charl Linssen, Jasper Albers, Stefan Dasbach, Renato Duarte, Susanne Kunkel, Abigail Morrison, Johanna Senk, Jonas Stapmanns, Tom Tetzlaff, Markus Diesmann, Sacha J. van Albada

    Abstract: This chapter sheds light on the synaptic organization of the brain from the perspective of computational neuroscience. It provides an introductory overview on how to account for empirical data in mathematical models, implement such models in software, and perform simulations reflecting experiments. This path is demonstrated with respect to four key aspects of synaptic signaling: the connectivity o… ▽ More

    Submitted 19 February, 2023; v1 submitted 10 December, 2022; originally announced December 2022.

    Comments: 38 pages, 5 figures, LaTeX; added two figures, clarified and extended formulations, updated format, added references

  15. arXiv:2208.10087  [pdf

    cs.CY

    A Trust Framework for Government Use of Artificial Intelligence and Automated Decision Making

    Authors: Pia Andrews, Tim de Sousa, Bruce Haefele, Matt Beard, Marcus Wigan, Abhinav Palia, Kathy Reid, Saket Narayan, Morgan Dumitru, Alex Morrison, Geoff Mason, Aurelie Jacquet

    Abstract: This paper identifies the current challenges of the mechanisation, digitisation and automation of public sector systems and processes, and proposes a modern and practical framework to ensure and assure ethical and high veracity Artificial Intelligence (AI) or Automated Decision Making (ADM) systems in public institutions. This framework is designed for the specific context of the public sector, in… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

    Comments: Comments were integrated into the paper from all peer reviewers. Am happy to provide a copied history of comments if useful

  16. arXiv:2203.17139  [pdf, other

    cs.DS cs.DB

    Prefix Filter: Practically and Theoretically Better Than Bloom

    Authors: Tomer Even, Guy Even, Adam Morrison

    Abstract: Many applications of approximate membership query data structures, or filters, require only an incremental filter that supports insertions but not deletions. However, the design space of incremental filters is missing a "sweet spot" filter that combines space efficiency, fast queries, and fast insertions. Incremental filters, such as the Bloom and blocked Bloom filter, are not space efficient. Dyn… ▽ More

    Submitted 25 October, 2022; v1 submitted 31 March, 2022; originally announced March 2022.

    Comments: Full version of VLDB'22 paper

  17. Exploring hyper-parameter spaces of neuroscience models on high performance computers with Learning to Learn

    Authors: Alper Yegenoglu, Anand Subramoney, Thorsten Hater, Cristian Jimenez-Romero, Wouter Klijn, Aaron Perez Martin, Michiel van der Vlag, Michael Herty, Abigail Morrison, Sandra Diaz-Pier

    Abstract: Neuroscience models commonly have a high number of degrees of freedom and only specific regions within the parameter space are able to produce dynamics of interest. This makes the development of tools and strategies to efficiently find these regions of high importance to advance brain research. Exploring the high dimensional parameter space using numerical simulations has been a frequently used te… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  18. arXiv:2201.09331  [pdf, other

    cs.DS cs.DB cs.DC

    Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing

    Authors: Adar Zeitak, Adam Morrison

    Abstract: We present the Cuckoo Trie, a fast, memory-efficient ordered index structure. The Cuckoo Trie is designed to have memory-level parallelism -- which a modern out-of-order processor can exploit to execute DRAM accesses in parallel -- without sacrificing memory efficiency. The Cuckoo Trie thus breaks a fundamental performance barrier faced by current indexes, whose bottleneck is a series of dependent… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

    Comments: Published in SOSP 2021

  19. arXiv:2110.12261  [pdf, other

    cs.CV eess.IV

    espiownage: Tracking Transients in Steelpan Drum Strikes Using Surveillance Technology

    Authors: Scott H. Hawley, Andrew C. Morrison, Grant S. Morgan

    Abstract: We present an improvement in the ability to meaningfully track features in high speed videos of Caribbean steelpan drums illuminated by Electronic Speckle Pattern Interferometry (ESPI). This is achieved through the use of up-to-date computer vision libraries for object detection and image segmentation as well as a significant effort toward cleaning the dataset previously used to train systems for… ▽ More

    Submitted 23 October, 2021; originally announced October 2021.

    Comments: 6 pages, 5 figures, submitted to NeurIPS 2021 Workshop on Machine Learning and the Physical Sciences

    ACM Class: I.4.6; I.4.9

  20. arXiv:2110.10280  [pdf, other

    quant-ph

    Logical fermions for fault-tolerant quantum simulation

    Authors: Andrew J. Landahl, Benjamin C. A. Morrison

    Abstract: We show how to absorb fermionic quantum simulation's expensive fermion-to-qubit mapping overhead into the overhead already incurred by surface-code-based fault-tolerant quantum computing. The key idea is to process information in surface-code twist defects, which behave like logical Majorana fermions. Our approach encodes Dirac fermions, a key data type for simulation applications, directly into l… ▽ More

    Submitted 6 July, 2023; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: 23 pages, 21 figures. v3 streamlines the title and makes minor corrections to the bibliography

  21. arXiv:2106.15601  [pdf, other

    cs.CR

    An Analysis of Speculative Type Confusion Vulnerabilities in the Wild

    Authors: Ofek Kirzner, Adam Morrison

    Abstract: Spectre v1 attacks, which exploit conditional branch misprediction, are often identified with attacks that bypass array bounds checking to leak data from a victim's memory. Generally, however, Spectre v1 attacks can exploit any conditional branch misprediction that makes the victim execute code incorrectly. In this paper, we investigate speculative type confusion, a Spectre v1 attack vector in whi… ▽ More

    Submitted 2 July, 2021; v1 submitted 29 June, 2021; originally announced June 2021.

    Comments: To appear in USENIX Security 2021

  22. arXiv:2102.00632  [pdf, other

    cs.CV cs.LG physics.app-ph physics.ins-det

    ConvNets for Counting: Object Detection of Transient Phenomena in Steelpan Drums

    Authors: Scott H. Hawley, Andrew C. Morrison

    Abstract: We train an object detector built from convolutional neural networks to count interference fringes in elliptical antinode regions in frames of high-speed video recordings of transient oscillations in Caribbean steelpan drums illuminated by electronic speckle pattern interferometry (ESPI). The annotations provided by our model aim to contribute to the understanding of time-dependent behavior in suc… ▽ More

    Submitted 6 September, 2021; v1 submitted 31 January, 2021; originally announced February 2021.

    Comments: 13 pages, 9 figures, accepted for J. Acous. Soc. Am. (JASA) Special Issue on Machine Learning in Acoustics

    ACM Class: I.4.7

  23. arXiv:2011.07622  [pdf, other

    cs.DC

    Recoverable, Abortable, and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity

    Authors: Daniel Katzan, Adam Morrison

    Abstract: We present the first recoverable mutual exclusion (RME) algorithm that is simultaneously abortable, adaptive to point contention, and with sublogarithmic RMR complexity. Our algorithm has $O(\min(K,\log_W N))$ RMR passage complexity and $O(F + \min(K,\log_W N))$ RMR super-passage complexity, where $K$ is the number of concurrent processes (point contention), $W$ is the size (in bits) of registers,… ▽ More

    Submitted 8 July, 2023; v1 submitted 15 November, 2020; originally announced November 2020.

    Comments: Full version of OPODIS 2020 paper

  24. Proving Highly-Concurrent Traversals Correct

    Authors: Yotam M. Y. Feldman, Artem Khyzha, Constantin Enea, Adam Morrison, Aleksandar Nanevski, Noam Rinetzky, Sharon Shoham

    Abstract: Modern highly-concurrent search data structures, such as search trees, obtain multi-core scalability and performance by having operations traverse the data structure without any synchronization. As a result, however, these algorithms are notoriously difficult to prove linearizable, which requires identifying a point in time in which the traversal's result is correct. The problem is that traversing… ▽ More

    Submitted 10 January, 2024; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: Extended version of a paper appearing in OOPSLA'20

  25. Asymptotic analysis of the Boltzmann equation for dark matter relic abundance

    Authors: Logan A. Morrison, Hiren H. Patel, Jaryd F. Ulbricht

    Abstract: A solution to the Boltzmann equation governing the thermal relic abundance of cold dark matter is constructed by matched asymptotic approximations. The approximation of the relic density is an asymptotic series valid when the abundance does not deviate significantly from its equilibrium value until small temperatures. Resonance and threshold effects are taken into account at leading order and foun… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: 15 pages, 6 figures

    Journal ref: JCAP07(2021)024

  26. arXiv:2008.08042  [pdf, ps, other

    quant-ph cs.MS

    Just another quantum assembly language (Jaqal)

    Authors: Benjamin C. A. Morrison, Andrew J. Landahl, Daniel S. Lobser, Kenneth M. Rudinger, Antonio E. Russo, Jay W. Van Der Wall, Peter Maunz

    Abstract: The Quantum Scientific Computing Open User Testbed (QSCOUT) is a trapped-ion quantum computer testbed realized at Sandia National Laboratories on behalf of the Department of Energy's Office of Science and its Advanced Scientific Computing (ASCR) program. Here we describe Jaqal, for Just another quantum assembly language, the programming language we invented to specify programs executed on QSCOUT.… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

    Comments: Accepted by the IEEE International Conference on Quantum Computing and Engineering, Oct. 12-16, 2020. Contains overlaps with the formal Jaqal language specification in arXiv:2003.09382, but expands significantly on the rationales behind the language choices made

  27. arXiv:2007.11818  [pdf, other

    cs.AR cs.CR

    Speculative Interference Attacks: Breaking Invisible Speculation Schemes

    Authors: Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos Rozas, Adam Morrison, Frank Mckeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa Alameldeen

    Abstract: Recent security vulnerabilities that target speculative execution (e.g., Spectre) present a significant challenge for processor design. The highly publicized vulnerability uses speculative execution to learn victim secrets by changing cache state. As a result, recent computer architecture research has focused on invisible speculation mechanisms that attempt to block changes in cache state due to s… ▽ More

    Submitted 23 April, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: Updated CR Version

  28. Evaluating energy differences on a quantum computer with robust phase estimation

    Authors: A. E. Russo, K. M. Rudinger, B. C. A. Morrison, A. D. Baczewski

    Abstract: We adapt the robust phase estimation algorithm to the evaluation of energy differences between two eigenstates using a quantum computer. This approach does not require controlled unitaries between auxiliary and system registers or even a single auxiliary qubit. As a proof of concept, we calculate the energies of the ground state and low-lying electronic excitations of a hydrogen molecule in a mini… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 15 pages, 6 figures (including supplemental material)

    Journal ref: Phys. Rev. Lett. 126, 210501 (2021)

  29. arXiv:2003.09382  [pdf, other

    quant-ph

    Jaqal, the Quantum Assembly Language for QSCOUT

    Authors: Andrew J. Landahl, Daniel S. Lobser, Benjamin C. A. Morrison, Kenneth M. Rudinger, Antonio E. Russo, Jay W. Van Der Wall, Peter Maunz

    Abstract: QSCOUT is the Quantum Scientific Computing Open User Testbed, a trapped-ion quantum computer testbed realized at Sandia National Laboratories on behalf of the Department of Energy's Office of Science and its Advanced Scientific Computing (ASCR) program. Jaqal, for Just Another Quantum Assembly Language, is the programming language used to specify programs executed on QSCOUT. This document contains… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

    Comments: 14 pages, 0 figures

    Report number: SAND2020-3480 R

  30. Hidden symmetries for transparent de Sitter space

    Authors: Garrett Compton, Ian A. Morrison

    Abstract: It is known that odd-dimensional de Sitter space acts as a transparent potential for free fields. Previous studies have explained this phenomena by relating de Sitter free field equations of motion to the time-independent Schrodinger equation with known transparent potentials. In this work we show that de Sitter's transparency is a consequence of an infinite set of "hidden" symmetries. These symme… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

    Comments: 17 pp

  31. One-Loop Charge-Breaking Minima in the Two-Higgs Doublet Model

    Authors: Pedro M. Ferreira, Logan A. Morrison, Stefano Profumo

    Abstract: We analyze the vacuum structure of the one-loop effective potential in the two Higgs doublet model. We find that electroweak-breaking vacuua can coexist with charge breaking ones, contradicting a theorem valid at tree-level. We perform a numerical analysis of the model and supply explicit parameter values for which charge-breaking vacuua can be the global minimum of the theory, and deeper than cha… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

    Comments: 32 pages, 4 Figures

  32. Firing rate homeostasis counteracts changes in stability of recurrent neural networks caused by synapse loss in Alzheimer's disease

    Authors: Claudia Bachmann, Tom Tetzlaff, Renato Duarte, Abigail Morrison

    Abstract: The impairment of cognitive function in Alzheimer's is clearly correlated to synapse loss. However, the mechanisms underlying this correlation are only poorly understood. Here, we investigate how the loss of excitatory synapses in sparsely connected random networks of spiking excitatory and inhibitory neurons alters their dynamical characteristics. Beyond the effects on the network's activity stat… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

  33. arXiv:1908.01405  [pdf, other

    cs.NI cs.CR

    Programmable In-Network Security for Context-aware BYOD Policies

    Authors: Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo

    Abstract: Bring Your Own Device (BYOD) has become the new norm in enterprise networks, but BYOD security remains a top concern. Context-aware security, which enforces access control based on dynamic runtime context, holds much promise. Recent work has developed SDN solutions to collect device context for network-wide access control in a central controller. However, the central controller poses a bottleneck… ▽ More

    Submitted 4 August, 2019; originally announced August 2019.

  34. arXiv:1907.12275  [pdf

    cs.DC cs.HC

    Staged deployment of interactive multi-application HPC workflows

    Authors: Wouter Klijn, Sandra Diaz-Pier, Abigail Morrison, Alexander Peyser

    Abstract: Running scientific workflows on a supercomputer can be a daunting task for a scientific domain specialist. Workflow management solutions (WMS) are a standard method for reducing the complexity of application deployment on high performance computing (HPC) infrastructure. We introduce the design for a middleware system that extends and combines the functionality from existing solutions in order to c… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Comments: 7 pages, 3 figures, The 2019 International Conference on High Performance Computing & Simulation

  35. Kinetic energy of eddy-like features from sea surface altimetry

    Authors: Josué Martínez-Moreno, Andrew McC. Hogg, Andrew E. Kiss, Navid C. Constantinou, Adele K. Morrison

    Abstract: The mesoscale eddy field plays a key role in the mixing and transport of physical and biological properties and redistribute energy budgets in the ocean. Eddy kinetic energy is commonly defined as the kinetic energy of the time-varying component of the velocity field. However, this definition contains all processes that vary in time, including coherent mesoscale eddies, jets, waves, and large-scal… ▽ More

    Submitted 23 August, 2019; v1 submitted 5 June, 2019; originally announced June 2019.

    Comments: 20 pages, 8 figures; TrackEddy available at https://github.com/josuemtzmo/trackeddy

    Journal ref: J. Adv. Model. Earth Sy., 11 (10), 3090-3105 (2019)

  36. arXiv:1808.07717  [pdf

    q-bio.PE

    Multiple Sequence Alignment is not a Solved Problem

    Authors: David A. Morrison

    Abstract: Multiple sequence alignment is a basic procedure in molecular biology, and it is often treated as being essentially a solved computational problem. However, this is not so, and here I review the evidence for this claim, and outline the requirements for a solution. The goal of alignment is often stated to be to juxtapose nucleotides (or their derivatives, such as amino acids) that have been inherit… ▽ More

    Submitted 23 August, 2018; originally announced August 2018.

    Comments: 37 pages, 5 figures, 3 tables

  37. arXiv:1807.10851  [pdf, other

    hep-ph

    Comparing AdS/QCD and Sum Rules predictions for $B\to K^*ν\barν$

    Authors: Mohammad Ahmady, Alexandre Leger, Zoe McIntyre, Alexander Morrison, Ruben Sandapen

    Abstract: Using the form factors obtained from holographic AdS/QCD and QCD sum rules, we predict the differential branching ratio and longitudinal polarization fraction for the rare $B\to K^* ν\barν$ decay. This is an interesting decay channel as it does not suffer from hadronic uncertainties beyond the form factors. We point out that the future measurement of the $B\to K^* ν\barν$ with around 30% accuracy… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: 5 pages, 9 figures, To appear in the proceedings of The International Conference on B-Physics at Frontier Machines - BEAUTY2018, 6-11 May, 2018, La Biodola, Elba Island, Italy

  38. arXiv:1805.03992  [pdf, other

    cs.DC

    Order out of Chaos: Proving Linearizability Using Local Views

    Authors: Yotam M. Y. Feldman, Constantin Enea, Adam Morrison, Noam Rinetzky, Sharon Shoham

    Abstract: Proving the linearizability of highly concurrent data structures, such as those using optimistic concurrency control, is a challenging task. The main difficulty is in reasoning about the view of the memory obtained by the threads, because as they execute, threads observe different fragments of memory from different points in time. Until today, every linearizability proof has tackled this challenge… ▽ More

    Submitted 5 August, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

    Comments: Full version of the DISC'18 paper

  39. Probing transition form factors in the rare $B\to K^*ν\barν$ decay

    Authors: Mohammad Ahmady, Alexandre Leger, Zoe McIntyre, Alexander Morrison, Ruben Sandapen

    Abstract: We compare the Standard Model (SM) predictions for the differential branching ratio of the rare $B\to K^*ν\barν$ decays using $B \to K^*$ form factors obtained from holographic light-front QCD (hLFQCD) and Sum Rules (SR) Distribution Amplitudes. For the total branching ratio, we predict $\mathcal{BR}(\process)_{\rm hLFQCD}=(6.36^{+0.59}_{-0.74})\times 10^{-6}$ and… ▽ More

    Submitted 11 September, 2018; v1 submitted 8 May, 2018; originally announced May 2018.

    Comments: 13 pages, 5 figures and 4 tables

    Journal ref: Phys. Rev. D 98, 053002 (2018)

  40. arXiv:1803.02626  [pdf, other

    q-bio.QM q-bio.NC stat.AP

    Inferring health conditions from fMRI-graph data

    Authors: PierGianLuca Porta Mana, Claudia Bachmann, Abigail Morrison

    Abstract: Automated classification methods for disease diagnosis are currently in the limelight, especially for imaging data. Classification does not fully meet a clinician's needs, however: in order to combine the results of multiple tests and decide on a course of treatment, a clinician needs the likelihood of a given health condition rather than binary classification yielded by such methods. We illustrat… ▽ More

    Submitted 4 May, 2018; v1 submitted 7 March, 2018; originally announced March 2018.

    Comments: V1: 35 pages, 5 figures, 2 tables. V2: 36 pages, 5 figures, 2 tables; partially rewritten all sections and added references. V3: Rewritten introduction

    MSC Class: 92C50; 62F15; 60G09; 62B05; 62Cxx

  41. arXiv:1711.02479  [pdf

    physics.optics

    Nanoscale spectroscopic studies of two different physical origins of the tip-enhanced force: dipole and thermal

    Authors: Junghoon Jahng, Sung Park, Will A. Morrison, Hyuksang Kwon, Derek Nowak, Eric O. Potma, Eun Seong Lee

    Abstract: When light illuminates the junction formed between a sharp metal tip and a sample, different mechanisms can con-tribute to the measured photo-induced force simultaneously. Of particular interest are the instantaneous force be-tween the induced dipoles in the tip and in the sample and the force related to thermal heating of the junction. A key difference between these two force mechanisms is their… ▽ More

    Submitted 7 March, 2018; v1 submitted 7 November, 2017; originally announced November 2017.

    Comments: 17 pages, 10 figures

  42. arXiv:1709.05650  [pdf, other

    q-bio.NC

    Closing the loop between neural network simulators and the OpenAI Gym

    Authors: Jakob Jordan, Philipp Weidel, Abigail Morrison

    Abstract: Since the enormous breakthroughs in machine learning over the last decade, functional neural network models are of growing interest for many researchers in the field of computational neuroscience. One major branch of research is concerned with biologically plausible implementations of reinforcement learning, with a variety of different models developed over the recent years. However, most studies… ▽ More

    Submitted 17 September, 2017; originally announced September 2017.

  43. arXiv:1610.03764  [pdf, other

    math.NA

    Technical Report: Improved Fourier Reconstruction using Jump Information with Applications to MRI

    Authors: Jade Larriva-Latt, Angela Morrison, Alison Radgowski, Joseph Tobin, Aditya Viswanathan, Mark Iwen

    Abstract: Certain applications such as Magnetic Resonance Imaging (MRI) require the reconstruction of functions from Fourier spectral data. When the underlying functions are piecewise-smooth, standard Fourier approximation methods suffer from the Gibbs phenomenon - with associated oscillatory artifacts in the vicinity of edges and an overall reduced order of convergence in the approximation. This paper prop… ▽ More

    Submitted 12 October, 2016; originally announced October 2016.

  44. arXiv:1606.02882  [pdf

    cs.SE

    NESTML: a modeling language for spiking neurons

    Authors: Dimitri Plotnikov, Bernhard Rumpe, Inga Blundell, Tammo Ippen, Jochen Martin Eppler, Abgail Morrison

    Abstract: Biological nervous systems exhibit astonishing complexity .Neuroscientists aim to capture this com- plexity by modeling and simulation of biological processes. Often very comple xm odels are nec- essary to depict the processes, which makes it dif fi cult to create these models. Powerful tools are thus necessary ,which enable neuroscientists to express models in acomprehensi ve and concise way and… ▽ More

    Submitted 9 June, 2016; originally announced June 2016.

    Comments: 16 pages, 5 figures, Modellierung 2016 Conference

  45. Aqueous ammonium thiocyanate solutions as refractive index-matching fluids with low density and viscosity

    Authors: Daniel Borrero-Echeverry, Benjamin C. A. Morrison

    Abstract: We show that aqueous solutions of ammonium thiocyanate (NH4SCN) can be used to match the index of refraction of several transparent materials commonly used in experiments, while maintaining low viscosity and density compared to other common refractive index-matching liquids. We present empirical models for estimating the index of refraction, density, and kinematic viscosity of these solutions as a… ▽ More

    Submitted 24 June, 2016; v1 submitted 24 May, 2016; originally announced May 2016.

    Comments: 5 pages, 5 figures. Corrected missing minus signs in Table 1

    Journal ref: Exp. Fluids 57, 123 (2016)

  46. Closed loop interactions between spiking neural network and robotic simulators based on MUSIC and ROS

    Authors: Philipp Weidel, Mikael Djurfeldt, Renato Duarte, Abigail Morrison

    Abstract: In order to properly assess the function and computational properties of simulated neural systems, it is necessary to account for the nature of the stimuli that drive the system. However, providing stimuli that are rich and yet both reproducible and amenable to experimental manipulations is technically challenging, and even more so if a closed-loop scenario is required. In this work, we present a… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

  47. arXiv:1601.00231  [pdf, other

    hep-th astro-ph.CO gr-qc hep-ph

    Fluctuations in a Cosmology with a Space-Like Singularity and their Gauge Theory Dual Description

    Authors: Robert H. Brandenberger, Yi-Fu Cai, Sumit R. Das, Elisa G. M. Ferreira, Ian A. Morrison, Yi Wang

    Abstract: We consider a time-dependent deformation of anti-de-Sitter (AdS) space-time which contains a cosmological "singularity" - a space-like region of high curvature. Making use of the AdS/CFT correspondence we can map the bulk dynamics onto the boundary. The boundary theory has a time dependent coupling constant which becomes small at times when the bulk space-time is highly curved. We investigate the… ▽ More

    Submitted 26 January, 2016; v1 submitted 2 January, 2016; originally announced January 2016.

    Comments: 19 pages, 3 figures, wording in the introductory section modified

    Journal ref: Phys. Rev. D 94, 083508 (2016)

  48. On higher spin symmetries in de Sitter QFTs

    Authors: Renato Costa, Ian A. Morrison

    Abstract: We consider the consequences of global higher-spin symmetries in quantum field theories on a fixed de Sitter background of spacetime dimension $D \ge 3$. These symmetries enhance the symmetry group associated with the isometries of the de Sitter background and thus strongly constrain the dynamics of the theory. In particular, we consider the case when a higher spin charge acts linearly on a scalar… ▽ More

    Submitted 3 March, 2016; v1 submitted 20 November, 2015; originally announced November 2015.

    Comments: 20 pp; accepted to JHEP; latest version: expanded introduction, additional references

    Report number: NSF-KITP-15-135

    Journal ref: JHEP 3 056 (2016)

  49. arXiv:1510.08116  [pdf, ps, other

    math.AG hep-th math.QA

    Motivic Donaldson--Thomas invariants of some quantized threefolds

    Authors: Alberto Cazzaniga, Andrew Morrison, Brent Pym, Balazs Szendroi

    Abstract: This paper is motivated by the question of how motivic Donaldson--Thomas invariants behave in families. We compute the invariants for some simple families of noncommutative Calabi--Yau threefolds, defined by quivers with homogeneous potentials. These families give deformation quantizations of affine three-space, the resolved conifold, and the resolution of the transversal $A_n$-singularity. It tur… ▽ More

    Submitted 27 October, 2015; originally announced October 2015.

    Comments: 19 pages

    MSC Class: 14A22; 14J32; 14N35; 16G20

  50. arXiv:1510.07898  [pdf, other

    cs.SE cs.LO

    Probabilistic Formal Analysis of App Usage to Inform Redesign

    Authors: Oana Andrei, Muffy Calder, Matthew Chalmers, Alistair Morrison, Mattias Rost

    Abstract: This paper sets out a process of app analysis intended to support understanding of use but also redesign. From usage logs we infer activity patterns - Markov models - and employ probabilistic formal analysis to ask questions about the use of the app. The core of this paper's contribution is a bridging of stochastic and formal modelling, but we also describe the work to make that analytic core util… ▽ More

    Submitted 27 October, 2015; originally announced October 2015.

    Comments: 13 pages, 6 figures, 7 tables, under review