-
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)
Authors:
Zirui Neil Zhao,
Adam Morrison,
Christopher W. Fletcher,
Josep Torrellas
Abstract:
Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled, quiescent local environments. Hence, it is unclear whether such attacks are feasible in a production cloud environment. In the cloud, side channels are flooded with noise from activities of other tenants and, in Function-as-a-Service (FaaS) workloads, the attacker has a very limited time window to mount the a…
▽ More
Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled, quiescent local environments. Hence, it is unclear whether such attacks are feasible in a production cloud environment. In the cloud, side channels are flooded with noise from activities of other tenants and, in Function-as-a-Service (FaaS) workloads, the attacker has a very limited time window to mount the attack. In this paper, we show that such attacks are feasible in practice, although they require new techniques. We present an end-to-end, cross-tenant attack on a vulnerable ECDSA implementation in the public FaaS Google Cloud Run environment. We introduce several new techniques to improve every step of the attack. First, to speed-up the generation of eviction sets, we introduce L2-driven candidate address filtering and a Binary Search-based algorithm for address pruning. Second, to monitor victim memory accesses with high time resolution, we introduce Parallel Probing. Finally, we leverage power spectral density from signal processing to easily identify the victim's target cache set in the frequency domain. Overall, using these mechanisms, we extract a median value of 81% of the secret ECDSA nonce bits from a victim container in 19 seconds on average.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Combinatorics of generalized parking-function polytopes
Authors:
Margaret M. Bayer,
Steffen Borgwardt,
Teressa Chambers,
Spencer Daugherty,
Aleyah Dawkins,
Danai Deligeorgaki,
Hsin-Chieh Liao,
Tyrrell McAllister,
Angela Morrison,
Garrett Nelson,
Andrés R. Vindas-Meléndez
Abstract:
For $\mathbf{b}=(b_1,\dots,b_n)\in \mathbb{Z}_{>0}^n$, a $\mathbf{b}$-parking function is defined to be a sequence $(β_1,\dots,β_n)$ of positive integers whose nondecreasing rearrangement $β'_1\leq β'_2\leq \cdots \leq β'_n$ satisfies $β'_i\leq b_1+\cdots + b_i$. The $\mathbf{b}$-parking-function polytope $\mathfrak{X}_n(\mathbf{b})$ is the convex hull of all $\mathbf{b}$-parking functions of leng…
▽ More
For $\mathbf{b}=(b_1,\dots,b_n)\in \mathbb{Z}_{>0}^n$, a $\mathbf{b}$-parking function is defined to be a sequence $(β_1,\dots,β_n)$ of positive integers whose nondecreasing rearrangement $β'_1\leq β'_2\leq \cdots \leq β'_n$ satisfies $β'_i\leq b_1+\cdots + b_i$. The $\mathbf{b}$-parking-function polytope $\mathfrak{X}_n(\mathbf{b})$ is the convex hull of all $\mathbf{b}$-parking functions of length $n$ in $\mathbb{R}^n$. Geometric properties of $\mathfrak{X}_n(\mathbf{b})$ were previously explored in the specific case where $\mathbf{b}=(a,b,b,\dots,b)$ and were shown to generalize those of the classical parking-function polytope. In this work, we study $\mathfrak{X}_n(\mathbf{b})$ in full generality. We present a minimal inequality and vertex description for $\mathfrak{X}_n(\mathbf{b})$, prove it is a generalized permutahedron, and study its $h$-polynomial. Furthermore, we investigate $\mathfrak{X}_n(\mathbf{b})$ through the perspectives of building sets and polymatroids, allowing us to identify its combinatorial types and obtain bounds on its combinatorial and circuit diameters.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Role of Oxygen in Laser Induced Contamination at Diamond-Vacuum Interfaces
Authors:
Shreyas Parthasarathy,
Maxime Joos,
Lillian B. Hughes,
Simon A. Meynell,
Taylor A. Morrison,
J. D. Risner-Jamtgaard,
David M. Weld,
Kunal Mukherjee,
Ania C. Bleszynski Jayich
Abstract:
Many modern-day quantum science experiments rely on high-fidelity measurement of fluorescent signals emitted by the quantum system under study. A pernicious issue encountered when such experiments are conducted near a material interface in vacuum is "laser-induced contamination" (LIC): the gradual accretion of fluorescent contaminants on the surface where a laser is focused. Fluorescence from thes…
▽ More
Many modern-day quantum science experiments rely on high-fidelity measurement of fluorescent signals emitted by the quantum system under study. A pernicious issue encountered when such experiments are conducted near a material interface in vacuum is "laser-induced contamination" (LIC): the gradual accretion of fluorescent contaminants on the surface where a laser is focused. Fluorescence from these contaminants can entirely drown out any signal from e.g. optically-probed color centers in the solid-state. Crucially, while LIC appears often in this context, it has not been systematically studied. In this work, we probe the onset and growth rate of LIC for a diamond nitrogen-vacancy center experiment in vacuum, and we correlate the contamination-induced fluorescence intensities to micron-scale physical build-up of contaminant on the diamond surface. Drawing upon similar phenomena previously studied in the space optics community, we use photo-catalyzed oxidation of contaminants as a mitigation strategy. We vary the residual oxygen pressure over 9 orders of magnitude and find that LIC growth is inhibited at near-atmospheric oxygen partial pressures, but the growth rate at lower oxygen pressure is non-monotonic. Finally, we discuss a model for the observed dependence of LIC growth rate on oxygen content and propose methods to extend in situ mitigation of LIC to a wider range of operating pressures.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Machine learning inspired models for Hall effects in non-collinear magnets
Authors:
Jonathan Kipp,
Fabian R. Lux,
Thorben Pürling,
Abigail Morrison,
Stefan Blügel,
Daniele Pinna,
Yuriy Mokrousov
Abstract:
The anomalous Hall effect has been front and center in solid state research and material science for over a century now, and the complex transport phenomena in nontrivial magnetic textures have gained an increasing amount of attention, both in theoretical and experimental studies. However, a clear path forward to capturing the influence of magnetization dynamics on anomalous Hall effect even in sm…
▽ More
The anomalous Hall effect has been front and center in solid state research and material science for over a century now, and the complex transport phenomena in nontrivial magnetic textures have gained an increasing amount of attention, both in theoretical and experimental studies. However, a clear path forward to capturing the influence of magnetization dynamics on anomalous Hall effect even in smallest frustrated magnets or spatially extended magnetic textures is still intensively sought after. In this work, we present an expansion of the anomalous Hall tensor into symmetrically invariant objects, encoding the magnetic configuration up to arbitrary power of spin. We show that these symmetric invariants can be utilized in conjunction with advanced regularization techniques in order to build models for the electric transport in magnetic textures which are, on one hand, complete with respect to the point group symmetry of the underlying lattice, and on the other hand, depend on a minimal number of order parameters only. Here, using a four-band tight-binding model on a honeycomb lattice, we demonstrate that the developed method can be used to address the importance and properties of higher-order contributions to transverse transport. The efficiency and breadth enabled by this method provides an ideal systematic approach to tackle the inherent complexity of response properties of noncollinear magnets, paving the way to the exploration of electric transport in intrinsically frustrated magnets as well as large-scale magnetic textures.
△ Less
Submitted 5 January, 2024;
originally announced January 2024.
-
On Combinatorial Network Flows Algorithms and Circuit Augmentation for Pseudoflows
Authors:
Steffen Borgwardt,
Angela Morrison
Abstract:
There is a wealth of combinatorial algorithms for classical min-cost flow problems and their simpler variants like max flow or shortest path problems. It is well-known that many of these algorithms are related to the Simplex method and the more general circuit augmentation schemes: prime examples are the network Simplex method, a refinement of the primal Simplex method, and min-mean cycle cancelin…
▽ More
There is a wealth of combinatorial algorithms for classical min-cost flow problems and their simpler variants like max flow or shortest path problems. It is well-known that many of these algorithms are related to the Simplex method and the more general circuit augmentation schemes: prime examples are the network Simplex method, a refinement of the primal Simplex method, and min-mean cycle canceling, which corresponds to a steepest-descent circuit augmentation scheme.
We are interested in a deeper understanding of the relationship between circuit augmentation and combinatorial network flows algorithms. To this end, we generalize from the consideration of primal or dual flows to so-called pseudoflows, which adhere to arc capacities but allow for a violation of flow balance. We introduce `pseudoflow polyhedra,' in which slack variables are used to quantify this violation, and characterize their circuits. This enables the study of combinatorial network flows algorithms in view of the walks that they trace in these polyhedra, and in view of the pivot rules for the steps. In doing so, we provide an `umbrella,' a general framework, that captures several algorithms.
We show that the Successive Shortest Path Algorithm for min-cost flow problems, the Shortest Augmenting Path Algorithm for max flow problems, and the Preflow-Push algorithm for max flow problems lead to (non-edge) circuit walks in these polyhedra. The former two are replicated by circuit augmentation schemes for simple pivot rules. Further, we show that the Hungarian Method leads to an edge walk and is replicated, equivalently, as a circuit augmentation scheme or a primal Simplex run for a simple pivot rule.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version)
Authors:
Rutvik Choudhary,
Alan Wang,
Zirui Neil Zhao,
Adam Morrison,
Christopher W. Fletcher
Abstract:
Speculative execution attacks undermine the security of constant-time programming, the standard technique used to prevent microarchitectural side channels in security-sensitive software such as cryptographic code. Constant-time code must therefore also deploy a defense against speculative execution attacks to prevent leakage of secret data stored in memory or the processor registers. Unfortunately…
▽ More
Speculative execution attacks undermine the security of constant-time programming, the standard technique used to prevent microarchitectural side channels in security-sensitive software such as cryptographic code. Constant-time code must therefore also deploy a defense against speculative execution attacks to prevent leakage of secret data stored in memory or the processor registers. Unfortunately, contemporary defenses, such as speculative load hardening (SLH), can only satisfy this strong security guarantee at a very high performance cost.
This paper proposes DECLASSIFLOW, a static program analysis and protection framework to efficiently protect constant-time code from speculative leakage. DECLASSIFLOW models "attacker knowledge" -- data which is inherently transmitted (or, implicitly declassified) by the code's non-speculative execution -- and statically removes protection on such data from points in the program where it is already guaranteed to leak non-speculatively. Overall, DECLASSIFLOW ensures that data which never leaks during the non-speculative execution does not leak during speculative execution, but with lower overhead than conservative protections like SLH.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Empirical Comparison between Cross-Validation and Mutation-Validation in Model Selection
Authors:
Jinyang Yu,
Sami Hamdan,
Leonard Sasse,
Abigail Morrison,
Kaustubh R. Patil
Abstract:
Mutation validation (MV) is a recently proposed approach for model selection, garnering significant interest due to its unique characteristics and potential benefits compared to the widely used cross-validation (CV) method. In this study, we empirically compared MV and $k$-fold CV using benchmark and real-world datasets. By employing Bayesian tests, we compared generalization estimates yielding th…
▽ More
Mutation validation (MV) is a recently proposed approach for model selection, garnering significant interest due to its unique characteristics and potential benefits compared to the widely used cross-validation (CV) method. In this study, we empirically compared MV and $k$-fold CV using benchmark and real-world datasets. By employing Bayesian tests, we compared generalization estimates yielding three posterior probabilities: practical equivalence, CV superiority, and MV superiority. We also evaluated the differences in the capacity of the selected models and computational efficiency. We found that both MV and CV select models with practically equivalent generalization performance across various machine learning algorithms and the majority of benchmark datasets. MV exhibited advantages in terms of selecting simpler models and lower computational costs. However, in some cases MV selected overly simplistic models leading to underfitting and showed instability in hyperparameter selection. These limitations of MV became more evident in the evaluation of a real-world neuroscientific task of predicting sex at birth using brain functional connectivity.
△ Less
Submitted 15 February, 2024; v1 submitted 23 November, 2023;
originally announced November 2023.
-
Runtime Construction of Large-Scale Spiking Neuronal Network Models on GPU Devices
Authors:
Bruno Golosio,
Jose Villamar,
Gianmarco Tiddia,
Elena Pastorelli,
Jonas Stapmanns,
Viviana Fanti,
Pier Stanislao Paolucci,
Abigail Morrison,
Johanna Senk
Abstract:
Simulation speed matters for neuroscientific research: this includes not only how quickly the simulated model time of a large-scale spiking neuronal network progresses, but also how long it takes to instantiate the network model in computer memory. On the hardware side, acceleration via highly parallel GPUs is being increasingly utilized. On the software side, code generation approaches ensure hig…
▽ More
Simulation speed matters for neuroscientific research: this includes not only how quickly the simulated model time of a large-scale spiking neuronal network progresses, but also how long it takes to instantiate the network model in computer memory. On the hardware side, acceleration via highly parallel GPUs is being increasingly utilized. On the software side, code generation approaches ensure highly optimized code, at the expense of repeated code regeneration and recompilation after modifications to the network model. Aiming for a greater flexibility with respect to iterative model changes, here we propose a new method for creating network connections interactively, dynamically, and directly in GPU memory through a set of commonly used high-level connection rules. We validate the simulation performance with both consumer and data center GPUs on two neuroscientifically relevant models: a cortical microcircuit of about 77,000 leaky-integrate-and-fire neuron models and 300 million static synapses, and a two-population network recurrently connected using a variety of connection rules. With our proposed ad hoc network instantiation, both network construction and simulation times are comparable or shorter than those obtained with other state-of-the-art simulation technologies, while still meeting the flexibility demands of explorative network modeling.
△ Less
Submitted 16 June, 2023;
originally announced June 2023.
-
Women's participation in mathematics in Scotland, 1730-1850
Authors:
Amie Morrison,
Isobel Falconer
Abstract:
The eighteenth century saw a flourishing of scientific and philosophical thought throughout Scotland, known as the Scottish Enlightenment. The accomplishments of prominent male figures of this period have been well documented in all disciplines. However, studies of women's experiences are relatively sparse. This paper partially corrects this oversight by drawing together evidence for women's parti…
▽ More
The eighteenth century saw a flourishing of scientific and philosophical thought throughout Scotland, known as the Scottish Enlightenment. The accomplishments of prominent male figures of this period have been well documented in all disciplines. However, studies of women's experiences are relatively sparse. This paper partially corrects this oversight by drawing together evidence for women's participation in mathematics in Scotland between 1730 and 1850. In considering women across all social classes, it argues for a broad definition of 'mathematics' that includes arithmetic and astronomy, and assesses women's opportunities for engagement under three headings: education, family, and sociability. It concludes that certain elements of Scottish Enlightenment culture promoted wider participation by women in mathematical activities than has previously been recognized, but that such participation continued to be circumscribed by societal views of the role of women within family formation.
△ Less
Submitted 10 June, 2023;
originally announced June 2023.
-
Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)
Authors:
Adi Kaufman,
Moshik Hershcovitch,
Adam Morrison
Abstract:
Key-value stores typically leave access control to the systems for which they act as storage engines. Unfortunately, attackers may circumvent such read access controls via timing attacks on the key-value store, which use differences in query response times to glean information about stored data.
To date, key-value store timing attacks have aimed to disclose stored values and have exploited exter…
▽ More
Key-value stores typically leave access control to the systems for which they act as storage engines. Unfortunately, attackers may circumvent such read access controls via timing attacks on the key-value store, which use differences in query response times to glean information about stored data.
To date, key-value store timing attacks have aimed to disclose stored values and have exploited external mechanisms that can be disabled for protection. In this paper, we point out that key disclosure is also a security threat -- and demonstrate key disclosure timing attacks that exploit mechanisms of the key-value store itself.
We target LSM-tree based key-value stores utilizing range filters, which have been recently proposed to optimize LSM-tree range queries. We analyze the impact of the range filters SuRF and prefix Bloom filter on LSM-trees through a security lens, and show that they enable a key disclosure timing attack, which we call prefix siphoning. Prefix siphoning successfully leverages benign queries for non-present keys to identify prefixes of actual keys -- and in some cases, full keys -- in scenarios where brute force searching for keys (via exhaustive enumeration or random guesses) is infeasible.
△ Less
Submitted 8 September, 2023; v1 submitted 7 June, 2023;
originally announced June 2023.
-
JaqalPaw: A Guide to Defining Pulses and Waveforms for Jaqal
Authors:
Daniel Lobser,
Joshua Goldberg,
Andrew J. Landahl,
Peter Maunz,
Benjamin C. A. Morrison,
Kenneth Rudinger,
Antonio Russo,
Brandon Ruzic,
Daniel Stick,
Jay Van Der Wall,
Susan M. Clark
Abstract:
One of the many challenges of developing an open user testbed such as QSCOUT is providing an interface that maintains simplicity without compromising expressibility or control. This interface comprises two distinct elements: a quantum assembly language designed for specifying quantum circuits at the gate level, and a low-level counterpart used for describing gates in terms of waveforms that realiz…
▽ More
One of the many challenges of developing an open user testbed such as QSCOUT is providing an interface that maintains simplicity without compromising expressibility or control. This interface comprises two distinct elements: a quantum assembly language designed for specifying quantum circuits at the gate level, and a low-level counterpart used for describing gates in terms of waveforms that realize specific quantum operations. Jaqal, or "Just another quantum assembly language," is the language used in QSCOUT for gate-level descriptions of quantum circuits. JaqalPaw, or "Jaqal pulses and waveforms," is its pulse-level counterpart. This document concerns the latter, and presents a description of the tools needed for precisely defining the underlying waveforms associated with a gate primitive.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Probabilistic Formal Modelling to Uncover and Interpret Interaction Styles
Authors:
Oana Andrei,
Muffy Calder,
Matthew Chalmers,
Alistair Morrison
Abstract:
We present a study using new computational methods, based on a novel combination of machine learning for inferring admixture hidden Markov models and probabilistic model checking, to uncover interaction styles in a mobile app. These styles are then used to inform a redesign, which is implemented, deployed, and then analysed using the same methods. The data sets are logged user traces, collected ov…
▽ More
We present a study using new computational methods, based on a novel combination of machine learning for inferring admixture hidden Markov models and probabilistic model checking, to uncover interaction styles in a mobile app. These styles are then used to inform a redesign, which is implemented, deployed, and then analysed using the same methods. The data sets are logged user traces, collected over two six-month deployments of each version, involving thousands of users and segmented into different time intervals. The methods do not assume tasks or absolute metrics such as measures of engagement, but uncover the styles through unsupervised inference of clusters and analysis with probabilistic temporal logic. For both versions there was a clear distinction between the styles adopted by users during the first day/week/month of usage, and during the second and third months, a result we had not anticipated.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Emergent communication enhances foraging behaviour in evolved swarms controlled by Spiking Neural Networks
Authors:
Cristian Jimenez Romero,
Alper Yegenoglu,
Aarón Pérez Martín,
Sandra Diaz-Pier,
Abigail Morrison
Abstract:
Social insects such as ants communicate via pheromones which allows them to coordinate their activity and solve complex tasks as a swarm, e.g. foraging for food. This behavior was shaped through evolutionary processes. In computational models, self-coordination in swarms has been implemented using probabilistic or simple action rules to shape the decision of each agent and the collective behavior.…
▽ More
Social insects such as ants communicate via pheromones which allows them to coordinate their activity and solve complex tasks as a swarm, e.g. foraging for food. This behavior was shaped through evolutionary processes. In computational models, self-coordination in swarms has been implemented using probabilistic or simple action rules to shape the decision of each agent and the collective behavior. However, manual tuned decision rules may limit the behavior of the swarm. In this work we investigate the emergence of self-coordination and communication in evolved swarms without defining any explicit rule. We evolve a swarm of agents representing an ant colony. We use an evolutionary algorithm to optimize a spiking neural network (SNN) which serves as an artificial brain to control the behavior of each agent. The goal of the evolved colony is to find optimal ways to forage for food and return it to the nest in the shortest amount of time. In the evolutionary phase, the ants are able to learn to collaborate by depositing pheromone near food piles and near the nest to guide other ants. The pheromone usage is not manually encoded into the network; instead, this behavior is established through the optimization procedure. We observe that pheromone-based communication enables the ants to perform better in comparison to colonies where communication via pheromone did not emerge. We assess the foraging performance by comparing the SNN based model to a rule based system. Our results show that the SNN based model can efficiently complete the foraging task in a short amount of time. Our approach illustrates self coordination via pheromone emerges as a result of the network optimization. This work serves as a proof of concept for the possibility of creating complex applications utilizing SNNs as underlying architectures for multi-agent interactions where communication and self-coordination is desired.
△ Less
Submitted 8 September, 2023; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Phenomenological modeling of diverse and heterogeneous synaptic dynamics at natural density
Authors:
Agnes Korcsak-Gorzo,
Charl Linssen,
Jasper Albers,
Stefan Dasbach,
Renato Duarte,
Susanne Kunkel,
Abigail Morrison,
Johanna Senk,
Jonas Stapmanns,
Tom Tetzlaff,
Markus Diesmann,
Sacha J. van Albada
Abstract:
This chapter sheds light on the synaptic organization of the brain from the perspective of computational neuroscience. It provides an introductory overview on how to account for empirical data in mathematical models, implement such models in software, and perform simulations reflecting experiments. This path is demonstrated with respect to four key aspects of synaptic signaling: the connectivity o…
▽ More
This chapter sheds light on the synaptic organization of the brain from the perspective of computational neuroscience. It provides an introductory overview on how to account for empirical data in mathematical models, implement such models in software, and perform simulations reflecting experiments. This path is demonstrated with respect to four key aspects of synaptic signaling: the connectivity of brain networks, synaptic transmission, synaptic plasticity, and the heterogeneity across synapses. Each step and aspect of the modeling and simulation workflow comes with its own challenges and pitfalls, which are highlighted and addressed.
△ Less
Submitted 19 February, 2023; v1 submitted 10 December, 2022;
originally announced December 2022.
-
A Trust Framework for Government Use of Artificial Intelligence and Automated Decision Making
Authors:
Pia Andrews,
Tim de Sousa,
Bruce Haefele,
Matt Beard,
Marcus Wigan,
Abhinav Palia,
Kathy Reid,
Saket Narayan,
Morgan Dumitru,
Alex Morrison,
Geoff Mason,
Aurelie Jacquet
Abstract:
This paper identifies the current challenges of the mechanisation, digitisation and automation of public sector systems and processes, and proposes a modern and practical framework to ensure and assure ethical and high veracity Artificial Intelligence (AI) or Automated Decision Making (ADM) systems in public institutions. This framework is designed for the specific context of the public sector, in…
▽ More
This paper identifies the current challenges of the mechanisation, digitisation and automation of public sector systems and processes, and proposes a modern and practical framework to ensure and assure ethical and high veracity Artificial Intelligence (AI) or Automated Decision Making (ADM) systems in public institutions. This framework is designed for the specific context of the public sector, in the jurisdictional and constitutional context of Australia, but is extendable to other jurisdictions and private sectors. The goals of the framework are to: 1) earn public trust and grow public confidence in government systems; 2) to ensure the unique responsibilities and accountabilities (including to the public) of public institutions under Administrative Law are met effectively; and 3) to assure a positive human, societal and ethical impact from the adoption of such systems. The framework could be extended to assure positive environmental or other impacts, but this paper focuses on human/societal outcomes and public trust. This paper is meant to complement principles-based frameworks like Australia's Artificial Intelligence Ethics Framework and the EU Assessment List for Trustworthy AI. In many countries, COVID created a bubble of improved trust, a bubble which has arguably already popped, and in an era of unprecedented mistrust of public institutions (but even in times of high trust) it is not enough that a service is faster, or more cost-effective. This paper proposes recommendations for government systems (technology platforms, operations, culture, governance, engagement, etc.) that would help to improve public confidence and trust in public institutions, policies and services, whilst meeting the special obligations and responsibilities of the public sector.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Prefix Filter: Practically and Theoretically Better Than Bloom
Authors:
Tomer Even,
Guy Even,
Adam Morrison
Abstract:
Many applications of approximate membership query data structures, or filters, require only an incremental filter that supports insertions but not deletions. However, the design space of incremental filters is missing a "sweet spot" filter that combines space efficiency, fast queries, and fast insertions. Incremental filters, such as the Bloom and blocked Bloom filter, are not space efficient. Dyn…
▽ More
Many applications of approximate membership query data structures, or filters, require only an incremental filter that supports insertions but not deletions. However, the design space of incremental filters is missing a "sweet spot" filter that combines space efficiency, fast queries, and fast insertions. Incremental filters, such as the Bloom and blocked Bloom filter, are not space efficient. Dynamic filters (i.e., supporting deletions), such as the cuckoo or vector quotient filter, are space efficient but do not exhibit consistently fast insertions and queries.
In this paper, we propose the prefix filter, an incremental filter that addresses the above challenge: (1) its space (in bits) is similar to state-of-the-art dynamic filters; (2) query throughput is high and is comparable to that of the cuckoo filter; and (3) insert throughput is high with overall build times faster than those of the vector quotient filter and cuckoo filter by $1.39\times$-$1.46\times$ and $3.2\times$-$3.5\times$, respectively. We present a rigorous analysis of the prefix filter that holds also for practical set sizes (i.e., $n=2^{25}$). The analysis deals with the probability of failure, false positive rate, and probability that an operation requires accessing more than a single cache line.
△ Less
Submitted 25 October, 2022; v1 submitted 31 March, 2022;
originally announced March 2022.
-
Exploring hyper-parameter spaces of neuroscience models on high performance computers with Learning to Learn
Authors:
Alper Yegenoglu,
Anand Subramoney,
Thorsten Hater,
Cristian Jimenez-Romero,
Wouter Klijn,
Aaron Perez Martin,
Michiel van der Vlag,
Michael Herty,
Abigail Morrison,
Sandra Diaz-Pier
Abstract:
Neuroscience models commonly have a high number of degrees of freedom and only specific regions within the parameter space are able to produce dynamics of interest. This makes the development of tools and strategies to efficiently find these regions of high importance to advance brain research. Exploring the high dimensional parameter space using numerical simulations has been a frequently used te…
▽ More
Neuroscience models commonly have a high number of degrees of freedom and only specific regions within the parameter space are able to produce dynamics of interest. This makes the development of tools and strategies to efficiently find these regions of high importance to advance brain research. Exploring the high dimensional parameter space using numerical simulations has been a frequently used technique in the last years in many areas of computational neuroscience. High performance computing (HPC) can provide today a powerful infrastructure to speed up explorations and increase our general understanding of the model's behavior in reasonable times.
△ Less
Submitted 28 February, 2022;
originally announced February 2022.
-
Cuckoo Trie: Exploiting Memory-Level Parallelism for Efficient DRAM Indexing
Authors:
Adar Zeitak,
Adam Morrison
Abstract:
We present the Cuckoo Trie, a fast, memory-efficient ordered index structure. The Cuckoo Trie is designed to have memory-level parallelism -- which a modern out-of-order processor can exploit to execute DRAM accesses in parallel -- without sacrificing memory efficiency. The Cuckoo Trie thus breaks a fundamental performance barrier faced by current indexes, whose bottleneck is a series of dependent…
▽ More
We present the Cuckoo Trie, a fast, memory-efficient ordered index structure. The Cuckoo Trie is designed to have memory-level parallelism -- which a modern out-of-order processor can exploit to execute DRAM accesses in parallel -- without sacrificing memory efficiency. The Cuckoo Trie thus breaks a fundamental performance barrier faced by current indexes, whose bottleneck is a series of dependent pointer-chasing DRAM accesses -- e.g., traversing a search tree path -- which the processor cannot parallelize. Our evaluation shows that the Cuckoo Trie outperforms state-of-the-art-indexes by up to 20%--360% on a variety of datasets and workloads, typically with a smaller or comparable memory footprint.
△ Less
Submitted 23 January, 2022;
originally announced January 2022.
-
espiownage: Tracking Transients in Steelpan Drum Strikes Using Surveillance Technology
Authors:
Scott H. Hawley,
Andrew C. Morrison,
Grant S. Morgan
Abstract:
We present an improvement in the ability to meaningfully track features in high speed videos of Caribbean steelpan drums illuminated by Electronic Speckle Pattern Interferometry (ESPI). This is achieved through the use of up-to-date computer vision libraries for object detection and image segmentation as well as a significant effort toward cleaning the dataset previously used to train systems for…
▽ More
We present an improvement in the ability to meaningfully track features in high speed videos of Caribbean steelpan drums illuminated by Electronic Speckle Pattern Interferometry (ESPI). This is achieved through the use of up-to-date computer vision libraries for object detection and image segmentation as well as a significant effort toward cleaning the dataset previously used to train systems for this application. Besides improvements on previous metric scores by 10% or more, noteworthy in this project are the introduction of a segmentation-regression map for the entire drum surface yielding interference fringe counts comparable to those obtained via object detection, as well as the accelerated workflow for coordinating the data-cleaning-and-model-training feedback loop for rapid iteration allowing this project to be conducted on a timescale of only 18 days.
△ Less
Submitted 23 October, 2021;
originally announced October 2021.
-
Logical fermions for fault-tolerant quantum simulation
Authors:
Andrew J. Landahl,
Benjamin C. A. Morrison
Abstract:
We show how to absorb fermionic quantum simulation's expensive fermion-to-qubit mapping overhead into the overhead already incurred by surface-code-based fault-tolerant quantum computing. The key idea is to process information in surface-code twist defects, which behave like logical Majorana fermions. Our approach encodes Dirac fermions, a key data type for simulation applications, directly into l…
▽ More
We show how to absorb fermionic quantum simulation's expensive fermion-to-qubit mapping overhead into the overhead already incurred by surface-code-based fault-tolerant quantum computing. The key idea is to process information in surface-code twist defects, which behave like logical Majorana fermions. Our approach encodes Dirac fermions, a key data type for simulation applications, directly into logical Majorana fermions rather than atop a logical qubit layer in the architecture. Using quantum simulation of the $N$-fermion 2D Fermi-Hubbard model as an exemplar, we demonstrate two immediate algorithmic improvements. First, by preserving the model's locality at the logical level, we reduce the asymptotic Trotter-Suzuki quantum circuit depth from $\mathcal{O}(\sqrt{N})$ in a typical Jordan-Wigner encoding to $\mathcal{O}(1)$ in our encoding. Second, by exploiting optimizations manifest for logical fermions but less obvious for logical qubits, we reduce the $T$-count of the block-encoding \textsc{select} oracle by 20\% over standard implementations, even when realized by logical qubits and not logical fermions.
△ Less
Submitted 6 July, 2023; v1 submitted 19 October, 2021;
originally announced October 2021.
-
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
Authors:
Ofek Kirzner,
Adam Morrison
Abstract:
Spectre v1 attacks, which exploit conditional branch misprediction, are often identified with attacks that bypass array bounds checking to leak data from a victim's memory. Generally, however, Spectre v1 attacks can exploit any conditional branch misprediction that makes the victim execute code incorrectly. In this paper, we investigate speculative type confusion, a Spectre v1 attack vector in whi…
▽ More
Spectre v1 attacks, which exploit conditional branch misprediction, are often identified with attacks that bypass array bounds checking to leak data from a victim's memory. Generally, however, Spectre v1 attacks can exploit any conditional branch misprediction that makes the victim execute code incorrectly. In this paper, we investigate speculative type confusion, a Spectre v1 attack vector in which branch mispredictions make the victim execute with variables holding values of the wrong type and thereby leak memory content.
We observe that speculative type confusion can be inadvertently introduced by a compiler, making it extremely hard for programmers to reason about security and manually apply Spectre mitigations. We thus set out to determine the extent to which speculative type confusion affects the Linux kernel. Our analysis finds exploitable and potentially-exploitable arbitrary memory disclosure vulnerabilities. We also find many latent vulnerabilities, which could become exploitable due to innocuous system changes, such as coding style changes.
Our results suggest that Spectre mitigations which rely on statically/manually identifying "bad" code patterns need to be rethought, and more comprehensive mitigations are needed.
△ Less
Submitted 2 July, 2021; v1 submitted 29 June, 2021;
originally announced June 2021.
-
ConvNets for Counting: Object Detection of Transient Phenomena in Steelpan Drums
Authors:
Scott H. Hawley,
Andrew C. Morrison
Abstract:
We train an object detector built from convolutional neural networks to count interference fringes in elliptical antinode regions in frames of high-speed video recordings of transient oscillations in Caribbean steelpan drums illuminated by electronic speckle pattern interferometry (ESPI). The annotations provided by our model aim to contribute to the understanding of time-dependent behavior in suc…
▽ More
We train an object detector built from convolutional neural networks to count interference fringes in elliptical antinode regions in frames of high-speed video recordings of transient oscillations in Caribbean steelpan drums illuminated by electronic speckle pattern interferometry (ESPI). The annotations provided by our model aim to contribute to the understanding of time-dependent behavior in such drums by tracking the development of sympathetic vibration modes. The system is trained on a dataset of crowdsourced human-annotated images obtained from the Zooniverse Steelpan Vibrations Project. Due to the small number of human-annotated images and the ambiguity of the annotation task, we also evaluate the model on a large corpus of synthetic images whose properties have been matched to the real images by style transfer using a Generative Adversarial Network. Applying the model to thousands of unlabeled video frames, we measure oscillations consistent with audio recordings of these drum strikes. One unanticipated result is that sympathetic oscillations of higher-octave notes significantly precede the rise in sound intensity of the corresponding second harmonic tones; the mechanism responsible for this remains unidentified. This paper primarily concerns the development of the predictive model; further exploration of the steelpan images and deeper physical insights await its further application.
△ Less
Submitted 6 September, 2021; v1 submitted 31 January, 2021;
originally announced February 2021.
-
Recoverable, Abortable, and Adaptive Mutual Exclusion with Sublogarithmic RMR Complexity
Authors:
Daniel Katzan,
Adam Morrison
Abstract:
We present the first recoverable mutual exclusion (RME) algorithm that is simultaneously abortable, adaptive to point contention, and with sublogarithmic RMR complexity. Our algorithm has $O(\min(K,\log_W N))$ RMR passage complexity and $O(F + \min(K,\log_W N))$ RMR super-passage complexity, where $K$ is the number of concurrent processes (point contention), $W$ is the size (in bits) of registers,…
▽ More
We present the first recoverable mutual exclusion (RME) algorithm that is simultaneously abortable, adaptive to point contention, and with sublogarithmic RMR complexity. Our algorithm has $O(\min(K,\log_W N))$ RMR passage complexity and $O(F + \min(K,\log_W N))$ RMR super-passage complexity, where $K$ is the number of concurrent processes (point contention), $W$ is the size (in bits) of registers, and $F$ is the number of crashes in a super-passage. Under the standard assumption that $W=Θ(\log N)$, these bounds translate to worst-case $O(\frac{\log N}{\log \log N})$ passage complexity and $O(F + \frac{\log N}{\log \log N})$ super-passage complexity. Our key building blocks are:
* A $D$-process abortable RME algorithm, for $D \leq W$, with $O(1)$ passage complexity and $O(1+F)$ super-passage complexity. We obtain this algorithm by using the Fetch-And-Add (FAA) primitive, unlike prior work on RME that uses Fetch-And-Store (FAS/SWAP).
* A generic transformation that transforms any abortable RME algorithm with passage complexity of $B < W$, into an abortable RME lock with passage complexity of $O(\min(K,B))$.
△ Less
Submitted 8 July, 2023; v1 submitted 15 November, 2020;
originally announced November 2020.
-
Proving Highly-Concurrent Traversals Correct
Authors:
Yotam M. Y. Feldman,
Artem Khyzha,
Constantin Enea,
Adam Morrison,
Aleksandar Nanevski,
Noam Rinetzky,
Sharon Shoham
Abstract:
Modern highly-concurrent search data structures, such as search trees, obtain multi-core scalability and performance by having operations traverse the data structure without any synchronization. As a result, however, these algorithms are notoriously difficult to prove linearizable, which requires identifying a point in time in which the traversal's result is correct. The problem is that traversing…
▽ More
Modern highly-concurrent search data structures, such as search trees, obtain multi-core scalability and performance by having operations traverse the data structure without any synchronization. As a result, however, these algorithms are notoriously difficult to prove linearizable, which requires identifying a point in time in which the traversal's result is correct. The problem is that traversing the data structure as it undergoes modifications leads to complex behaviors, necessitating intricate reasoning about all interleavings of reads by traversals and writes mutating the data structure.
In this paper, we present a general proof technique for proving unsynchronized traversals correct in a significantly simpler manner, compared to typical concurrent reasoning and prior proof techniques. Our framework relies only on sequential properties} of traversals and on a conceptually simple and widely-applicable condition about the ways an algorithm's writes mutate the data structure. Establishing that a target data structure satisfies our condition requires only simple concurrent reasoning, without considering interactions of writes and reads. This reasoning can be further simplified by using our framework.
To demonstrate our technique, we apply it to prove several interesting and challenging concurrent binary search trees: the logical-ordering AVL tree, the Citrus tree, and the full contention-friendly tree. Both the logical-ordering tree and the full contention-friendly tree are beyond the reach of previous approaches targeted at simplifying linearizability proofs.
△ Less
Submitted 10 January, 2024; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Asymptotic analysis of the Boltzmann equation for dark matter relic abundance
Authors:
Logan A. Morrison,
Hiren H. Patel,
Jaryd F. Ulbricht
Abstract:
A solution to the Boltzmann equation governing the thermal relic abundance of cold dark matter is constructed by matched asymptotic approximations. The approximation of the relic density is an asymptotic series valid when the abundance does not deviate significantly from its equilibrium value until small temperatures. Resonance and threshold effects are taken into account at leading order and foun…
▽ More
A solution to the Boltzmann equation governing the thermal relic abundance of cold dark matter is constructed by matched asymptotic approximations. The approximation of the relic density is an asymptotic series valid when the abundance does not deviate significantly from its equilibrium value until small temperatures. Resonance and threshold effects are taken into account at leading order and found to be negligible unless the annihilation cross section is negligible at threshold. Comparisons are made to previously attempted constructions and to the freeze out approximation commonly employed in the literature. Extensions to higher order matching is outlined, and implications for solving related systems are discussed. We compare our results to a numerical determination of the relic abundance using a benchmark model and find a fantastic agreement. The method developed also serves as a solution to a wide class of problems containing an infinite order turning point.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Just another quantum assembly language (Jaqal)
Authors:
Benjamin C. A. Morrison,
Andrew J. Landahl,
Daniel S. Lobser,
Kenneth M. Rudinger,
Antonio E. Russo,
Jay W. Van Der Wall,
Peter Maunz
Abstract:
The Quantum Scientific Computing Open User Testbed (QSCOUT) is a trapped-ion quantum computer testbed realized at Sandia National Laboratories on behalf of the Department of Energy's Office of Science and its Advanced Scientific Computing (ASCR) program. Here we describe Jaqal, for Just another quantum assembly language, the programming language we invented to specify programs executed on QSCOUT.…
▽ More
The Quantum Scientific Computing Open User Testbed (QSCOUT) is a trapped-ion quantum computer testbed realized at Sandia National Laboratories on behalf of the Department of Energy's Office of Science and its Advanced Scientific Computing (ASCR) program. Here we describe Jaqal, for Just another quantum assembly language, the programming language we invented to specify programs executed on QSCOUT. Jaqal is useful beyond QSCOUT---it can support mutliple hardware targets because it offloads gate names and their pulse-sequence definitions to external files. We describe the capabilities of the Jaqal language, our approach in designing it, and the reasons for its creation. To learn more about QSCOUT, Jaqal, or JaqalPaq, the metaprogramming Python package we developed for Jaqal, please visit https://qscout.sandia.gov, https://gitlab.com/jaqal, or send an e-mail to qscout@sandia.gov.
△ Less
Submitted 18 August, 2020;
originally announced August 2020.
-
Speculative Interference Attacks: Breaking Invisible Speculation Schemes
Authors:
Mohammad Behnia,
Prateek Sahu,
Riccardo Paccagnella,
Jiyong Yu,
Zirui Zhao,
Xiang Zou,
Thomas Unterluggauer,
Josep Torrellas,
Carlos Rozas,
Adam Morrison,
Frank Mckeen,
Fangfei Liu,
Ron Gabor,
Christopher W. Fletcher,
Abhishek Basak,
Alaa Alameldeen
Abstract:
Recent security vulnerabilities that target speculative execution (e.g., Spectre) present a significant challenge for processor design. The highly publicized vulnerability uses speculative execution to learn victim secrets by changing cache state. As a result, recent computer architecture research has focused on invisible speculation mechanisms that attempt to block changes in cache state due to s…
▽ More
Recent security vulnerabilities that target speculative execution (e.g., Spectre) present a significant challenge for processor design. The highly publicized vulnerability uses speculative execution to learn victim secrets by changing cache state. As a result, recent computer architecture research has focused on invisible speculation mechanisms that attempt to block changes in cache state due to speculative execution. Prior work has shown significant success in preventing Spectre and other vulnerabilities at modest performance costs. In this paper, we introduce speculative interference attacks, which show that prior invisible speculation mechanisms do not fully block these speculation-based attacks. We make two key observations. First, misspeculated younger instructions can change the timing of older, bound-to-retire instructions, including memory operations. Second, changing the timing of a memory operation can change the order of that memory operation relative to other memory operations, resulting in persistent changes to the cache state. Using these observations, we demonstrate (among other attack variants) that secret information accessed by mis-speculated instructions can change the order of bound-to-retire loads. Load timing changes can therefore leave secret-dependent changes in the cache, even in the presence of invisible speculation mechanisms. We show that this problem is not easy to fix: Speculative interference converts timing changes to persistent cache-state changes, and timing is typically ignored by many cache-based defenses. We develop a framework to understand the attack and demonstrate concrete proof-of-concept attacks against invisible speculation mechanisms. We provide security definitions sufficient to block speculative interference attacks; describe a simple defense mechanism with a high performance cost; and discuss how future research can improve its performance.
△ Less
Submitted 23 April, 2021; v1 submitted 23 July, 2020;
originally announced July 2020.
-
Evaluating energy differences on a quantum computer with robust phase estimation
Authors:
A. E. Russo,
K. M. Rudinger,
B. C. A. Morrison,
A. D. Baczewski
Abstract:
We adapt the robust phase estimation algorithm to the evaluation of energy differences between two eigenstates using a quantum computer. This approach does not require controlled unitaries between auxiliary and system registers or even a single auxiliary qubit. As a proof of concept, we calculate the energies of the ground state and low-lying electronic excitations of a hydrogen molecule in a mini…
▽ More
We adapt the robust phase estimation algorithm to the evaluation of energy differences between two eigenstates using a quantum computer. This approach does not require controlled unitaries between auxiliary and system registers or even a single auxiliary qubit. As a proof of concept, we calculate the energies of the ground state and low-lying electronic excitations of a hydrogen molecule in a minimal basis on a cloud quantum computer. The denominative robustness of our approach is then quantified in terms of a high tolerance to coherent errors in the state preparation and measurement. Conceptually, we note that all quantum phase estimation algorithms ultimately evaluate eigenvalue differences.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Jaqal, the Quantum Assembly Language for QSCOUT
Authors:
Andrew J. Landahl,
Daniel S. Lobser,
Benjamin C. A. Morrison,
Kenneth M. Rudinger,
Antonio E. Russo,
Jay W. Van Der Wall,
Peter Maunz
Abstract:
QSCOUT is the Quantum Scientific Computing Open User Testbed, a trapped-ion quantum computer testbed realized at Sandia National Laboratories on behalf of the Department of Energy's Office of Science and its Advanced Scientific Computing (ASCR) program. Jaqal, for Just Another Quantum Assembly Language, is the programming language used to specify programs executed on QSCOUT. This document contains…
▽ More
QSCOUT is the Quantum Scientific Computing Open User Testbed, a trapped-ion quantum computer testbed realized at Sandia National Laboratories on behalf of the Department of Energy's Office of Science and its Advanced Scientific Computing (ASCR) program. Jaqal, for Just Another Quantum Assembly Language, is the programming language used to specify programs executed on QSCOUT. This document contains a specification of Jaqal along with a summary of QSCOUT 1.0 capabilities, example Jaqal programs, and plans for possible future extensions. To learn more about QSCOUT and the Jaqal language developed for it, please visit qscout.sandia.gov or send an e-mail to qscout@sandia.gov.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
Hidden symmetries for transparent de Sitter space
Authors:
Garrett Compton,
Ian A. Morrison
Abstract:
It is known that odd-dimensional de Sitter space acts as a transparent potential for free fields. Previous studies have explained this phenomena by relating de Sitter free field equations of motion to the time-independent Schrodinger equation with known transparent potentials. In this work we show that de Sitter's transparency is a consequence of an infinite set of "hidden" symmetries. These symme…
▽ More
It is known that odd-dimensional de Sitter space acts as a transparent potential for free fields. Previous studies have explained this phenomena by relating de Sitter free field equations of motion to the time-independent Schrodinger equation with known transparent potentials. In this work we show that de Sitter's transparency is a consequence of an infinite set of "hidden" symmetries. These symmetries arise from an accidental symmetry for the zero-mode of matter fields, as well as the boost isometry of de Sitter space. For simplicity, we consider the case of massive Klein-Gordon theory. We show that the Noether charges associated with these hidden symmetries distinguish the two linearly-independent solutions of the free field wave equation in the asymptotic past and future of de Sitter. Conservation of these charges requires that the asymptotic behavior of any solution be identical, up to a constant phase, in the future and the past, which is the property of transparency. In the quantized theory, these charges act trivially on particle states belonging to the in/out vacuum Fock space. For particle states constructed from other vacua, the action of the charges generates particles. We comment on how these hidden symmetries may be present in interacting theories.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
One-Loop Charge-Breaking Minima in the Two-Higgs Doublet Model
Authors:
Pedro M. Ferreira,
Logan A. Morrison,
Stefano Profumo
Abstract:
We analyze the vacuum structure of the one-loop effective potential in the two Higgs doublet model. We find that electroweak-breaking vacuua can coexist with charge breaking ones, contradicting a theorem valid at tree-level. We perform a numerical analysis of the model and supply explicit parameter values for which charge-breaking vacuua can be the global minimum of the theory, and deeper than cha…
▽ More
We analyze the vacuum structure of the one-loop effective potential in the two Higgs doublet model. We find that electroweak-breaking vacuua can coexist with charge breaking ones, contradicting a theorem valid at tree-level. We perform a numerical analysis of the model and supply explicit parameter values for which charge-breaking vacuua can be the global minimum of the theory, and deeper than charge-preserving ones.
△ Less
Submitted 18 October, 2019;
originally announced October 2019.
-
Firing rate homeostasis counteracts changes in stability of recurrent neural networks caused by synapse loss in Alzheimer's disease
Authors:
Claudia Bachmann,
Tom Tetzlaff,
Renato Duarte,
Abigail Morrison
Abstract:
The impairment of cognitive function in Alzheimer's is clearly correlated to synapse loss. However, the mechanisms underlying this correlation are only poorly understood. Here, we investigate how the loss of excitatory synapses in sparsely connected random networks of spiking excitatory and inhibitory neurons alters their dynamical characteristics. Beyond the effects on the network's activity stat…
▽ More
The impairment of cognitive function in Alzheimer's is clearly correlated to synapse loss. However, the mechanisms underlying this correlation are only poorly understood. Here, we investigate how the loss of excitatory synapses in sparsely connected random networks of spiking excitatory and inhibitory neurons alters their dynamical characteristics. Beyond the effects on the network's activity statistics, we find that the loss of excitatory synapses on excitatory neurons shifts the network dynamic towards the stable regime. The decrease in sensitivity to small perturbations to time varying input can be considered as an indication of a reduction of computational capacity. A full recovery of the network performance can be achieved by firing rate homeostasis, here implemented by an up-scaling of the remaining excitatory-excitatory synapses. By analysing the stability of the linearized network dynamics, we explain how homeostasis can simultaneously maintain the network's firing rate and sensitivity to small perturbations.
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
Programmable In-Network Security for Context-aware BYOD Policies
Authors:
Qiao Kang,
Lei Xue,
Adam Morrison,
Yuxin Tang,
Ang Chen,
Xiapu Luo
Abstract:
Bring Your Own Device (BYOD) has become the new norm in enterprise networks, but BYOD security remains a top concern. Context-aware security, which enforces access control based on dynamic runtime context, holds much promise. Recent work has developed SDN solutions to collect device context for network-wide access control in a central controller. However, the central controller poses a bottleneck…
▽ More
Bring Your Own Device (BYOD) has become the new norm in enterprise networks, but BYOD security remains a top concern. Context-aware security, which enforces access control based on dynamic runtime context, holds much promise. Recent work has developed SDN solutions to collect device context for network-wide access control in a central controller. However, the central controller poses a bottleneck that can become an attack target, and processing context changes at remote software has low agility.
We present a new paradigm, programmable in-network security (Poise), which is enabled by the emergence of programmable switches. At the heart of Poise is a novel switch primitive, which can be programmed to support a wide range of context-aware policies in hardware. Users of Poise specify concise policies, and Poise compiles them into different instantiations of the security primitive in P4. Compared to centralized SDN defenses, Poise is resilient to control plane saturation attacks, and it dramatically increases defense agility.
△ Less
Submitted 4 August, 2019;
originally announced August 2019.
-
Staged deployment of interactive multi-application HPC workflows
Authors:
Wouter Klijn,
Sandra Diaz-Pier,
Abigail Morrison,
Alexander Peyser
Abstract:
Running scientific workflows on a supercomputer can be a daunting task for a scientific domain specialist. Workflow management solutions (WMS) are a standard method for reducing the complexity of application deployment on high performance computing (HPC) infrastructure. We introduce the design for a middleware system that extends and combines the functionality from existing solutions in order to c…
▽ More
Running scientific workflows on a supercomputer can be a daunting task for a scientific domain specialist. Workflow management solutions (WMS) are a standard method for reducing the complexity of application deployment on high performance computing (HPC) infrastructure. We introduce the design for a middleware system that extends and combines the functionality from existing solutions in order to create a high-level, staged user-centric operation/deployment model. This design addresses the requirements of several use cases in the life sciences, with a focus on neuroscience. In this manuscript we focus on two use cases: 1) three coupled neuronal simulators (for three different space/time scales) with in-transit visualization and 2) a closed-loop workflow optimized by machine learning, coupling a robot with a neural network simulation. We provide a detailed overview of the application-integrated monitoring in relationship with the HPC job. We present here a novel usage model for large scale interactive multi-application workflows running on HPC systems which aims at reducing the complexity of deployment and execution, thus enabling new science.
△ Less
Submitted 29 July, 2019;
originally announced July 2019.
-
Kinetic energy of eddy-like features from sea surface altimetry
Authors:
Josué Martínez-Moreno,
Andrew McC. Hogg,
Andrew E. Kiss,
Navid C. Constantinou,
Adele K. Morrison
Abstract:
The mesoscale eddy field plays a key role in the mixing and transport of physical and biological properties and redistribute energy budgets in the ocean. Eddy kinetic energy is commonly defined as the kinetic energy of the time-varying component of the velocity field. However, this definition contains all processes that vary in time, including coherent mesoscale eddies, jets, waves, and large-scal…
▽ More
The mesoscale eddy field plays a key role in the mixing and transport of physical and biological properties and redistribute energy budgets in the ocean. Eddy kinetic energy is commonly defined as the kinetic energy of the time-varying component of the velocity field. However, this definition contains all processes that vary in time, including coherent mesoscale eddies, jets, waves, and large-scale motions. The focus of this paper is on the eddy kinetic energy contained in coherent mesoscale eddies. We present a new method to decompose eddy kinetic energy into oceanic processes. The proposed method uses a new eddy-identification algorithm (TrackEddy). This algorithm is based on the premise that the sea level signature of a coherent eddy can be approximated as a Gaussian feature. The eddy Gaussian signature then allows for the calculation of kinetic energy of the eddy field through the geostrophic approximation. TrackEddy has been validated using synthetic sea surface height data, and then used to investigate trends of eddy kinetic energy in the Southern Ocean using Satellite Sea Surface Height anomaly (AVISO+). We detect an increasing trend of eddy kinetic energy associated with mesoscale eddies in the Southern Ocean. This trend is correlated with an increase of the coherent eddy amplitude and the strengthening of wind stress over the last two decades.
△ Less
Submitted 23 August, 2019; v1 submitted 5 June, 2019;
originally announced June 2019.
-
Multiple Sequence Alignment is not a Solved Problem
Authors:
David A. Morrison
Abstract:
Multiple sequence alignment is a basic procedure in molecular biology, and it is often treated as being essentially a solved computational problem. However, this is not so, and here I review the evidence for this claim, and outline the requirements for a solution. The goal of alignment is often stated to be to juxtapose nucleotides (or their derivatives, such as amino acids) that have been inherit…
▽ More
Multiple sequence alignment is a basic procedure in molecular biology, and it is often treated as being essentially a solved computational problem. However, this is not so, and here I review the evidence for this claim, and outline the requirements for a solution. The goal of alignment is often stated to be to juxtapose nucleotides (or their derivatives, such as amino acids) that have been inherited from a common ancestral nucleotide (although other goals are also possible). Unfortunately, this is not an operational definition, because homology (in this sense) refers to unique and unobservable historical events, and so there can be no objective mathematical function to optimize. Consequently, almost all algorithms developed for multiple sequence alignment are based on optimizing some sort of compositional similarity (similarity = homology + analogy). As a result, many, if not most, practitioners either manually modify computer-produced alignments or they perform de novo manual alignment, especially in the field of phylogenetics. So, if homology is the goal, then multiple sequence alignment is not yet a solved computational problem. Several criteria have been developed by biologists to help them identify potential homologies (compositional, ontogenetic, topographical and functional similarity, plus conjunction and congruence), and these criteria can be applied to molecular data, in principle. Current computer programs do implement one (or occasionally two) of these criteria, but no program implements them all. What is needed is a program that evaluates all of the evidence for the sequence homologies, optimizes their combination, and thus produces the best hypotheses of homology. This is basically an inference problem not an optimization problem.
△ Less
Submitted 23 August, 2018;
originally announced August 2018.
-
Comparing AdS/QCD and Sum Rules predictions for $B\to K^*ν\barν$
Authors:
Mohammad Ahmady,
Alexandre Leger,
Zoe McIntyre,
Alexander Morrison,
Ruben Sandapen
Abstract:
Using the form factors obtained from holographic AdS/QCD and QCD sum rules, we predict the differential branching ratio and longitudinal polarization fraction for the rare $B\to K^* ν\barν$ decay. This is an interesting decay channel as it does not suffer from hadronic uncertainties beyond the form factors. We point out that the future measurement of the $B\to K^* ν\barν$ with around 30% accuracy…
▽ More
Using the form factors obtained from holographic AdS/QCD and QCD sum rules, we predict the differential branching ratio and longitudinal polarization fraction for the rare $B\to K^* ν\barν$ decay. This is an interesting decay channel as it does not suffer from hadronic uncertainties beyond the form factors. We point out that the future measurement of the $B\to K^* ν\barν$ with around 30% accuracy can discriminate between the two models.
△ Less
Submitted 27 July, 2018;
originally announced July 2018.
-
Order out of Chaos: Proving Linearizability Using Local Views
Authors:
Yotam M. Y. Feldman,
Constantin Enea,
Adam Morrison,
Noam Rinetzky,
Sharon Shoham
Abstract:
Proving the linearizability of highly concurrent data structures, such as those using optimistic concurrency control, is a challenging task. The main difficulty is in reasoning about the view of the memory obtained by the threads, because as they execute, threads observe different fragments of memory from different points in time. Until today, every linearizability proof has tackled this challenge…
▽ More
Proving the linearizability of highly concurrent data structures, such as those using optimistic concurrency control, is a challenging task. The main difficulty is in reasoning about the view of the memory obtained by the threads, because as they execute, threads observe different fragments of memory from different points in time. Until today, every linearizability proof has tackled this challenge from scratch.
We present a unifying proof argument for the correctness of unsynchronized traversals, and apply it to prove the linearizability of several highly concurrent search data structures, including an optimistic self-balancing binary search tree, the Lazy List and a lock-free skip list. Our framework harnesses {\em sequential reasoning} about the view of a thread, considering the thread as if it traverses the data structure without interference from other operations. Our key contribution is showing that properties of reachability along search paths can be deduced for concurrent traversals from such interference-free traversals, when certain intuitive conditions are met. Basing the correctness of traversals on such \emph{local view arguments} greatly simplifies linearizability proofs.
To apply our framework, the user proves that the data structure satisfies two conditions: (1) acyclicity of the order on memory, even when it is considered across intermediate memory states, and (2) preservation of search paths to locations modified by interfering writes. Establishing the conditions, as well as the full linearizability proof utilizing our proof argument, reduces to simple concurrent reasoning. The result is a clear and comprehensible correctness proof, and elucidates common patterns underlying several existing data structures.
△ Less
Submitted 5 August, 2018; v1 submitted 10 May, 2018;
originally announced May 2018.
-
Probing transition form factors in the rare $B\to K^*ν\barν$ decay
Authors:
Mohammad Ahmady,
Alexandre Leger,
Zoe McIntyre,
Alexander Morrison,
Ruben Sandapen
Abstract:
We compare the Standard Model (SM) predictions for the differential branching ratio of the rare $B\to K^*ν\barν$ decays using $B \to K^*$ form factors obtained from holographic light-front QCD (hLFQCD) and Sum Rules (SR) Distribution Amplitudes. For the total branching ratio, we predict $\mathcal{BR}(\process)_{\rm hLFQCD}=(6.36^{+0.59}_{-0.74})\times 10^{-6}$ and…
▽ More
We compare the Standard Model (SM) predictions for the differential branching ratio of the rare $B\to K^*ν\barν$ decays using $B \to K^*$ form factors obtained from holographic light-front QCD (hLFQCD) and Sum Rules (SR) Distribution Amplitudes. For the total branching ratio, we predict $\mathcal{BR}(\process)_{\rm hLFQCD}=(6.36^{+0.59}_{-0.74})\times 10^{-6}$ and $\mathcal{BR}(\process)_{\rm SR}=(8.14^{+0.16}_{- 0.17})\times 10^{-6}$. More interestingly, we find that the two model predictions for the differential branching ratio are sufficiently different at low momentum transfer, so that future measurements at Belle II may be able to discriminate between them. We also confirm numerically that the $K^*$ longitudinal polarization fraction $F_L$ has little sensitivity to the non-perturbative form factors and is thus an excellent observable to probe New Physics signals. We predict $F_L=0.40^{+0.02}_{-0.01}(0.41\pm 0.01)$ using hLFQCD (SR).
△ Less
Submitted 11 September, 2018; v1 submitted 8 May, 2018;
originally announced May 2018.
-
Inferring health conditions from fMRI-graph data
Authors:
PierGianLuca Porta Mana,
Claudia Bachmann,
Abigail Morrison
Abstract:
Automated classification methods for disease diagnosis are currently in the limelight, especially for imaging data. Classification does not fully meet a clinician's needs, however: in order to combine the results of multiple tests and decide on a course of treatment, a clinician needs the likelihood of a given health condition rather than binary classification yielded by such methods. We illustrat…
▽ More
Automated classification methods for disease diagnosis are currently in the limelight, especially for imaging data. Classification does not fully meet a clinician's needs, however: in order to combine the results of multiple tests and decide on a course of treatment, a clinician needs the likelihood of a given health condition rather than binary classification yielded by such methods. We illustrate how likelihoods can be derived step by step from first principles and approximations, and how they can be assessed and selected, illustrating our approach using fMRI data from a publicly available data set containing schizophrenic and healthy control subjects. We start from the basic assumption of partial exchangeability, and then the notion of sufficient statistics and the "method of translation" (Edgeworth, 1898) combined with conjugate priors. This method can be used to construct a likelihood that can be used to compare different data-reduction algorithms. Despite the simplifications and possibly unrealistic assumptions used to illustrate the method, we obtain classification results comparable to previous, more realistic studies about schizophrenia, whilst yielding likelihoods that can naturally be combined with the results of other diagnostic tests.
△ Less
Submitted 4 May, 2018; v1 submitted 7 March, 2018;
originally announced March 2018.
-
Nanoscale spectroscopic studies of two different physical origins of the tip-enhanced force: dipole and thermal
Authors:
Junghoon Jahng,
Sung Park,
Will A. Morrison,
Hyuksang Kwon,
Derek Nowak,
Eric O. Potma,
Eun Seong Lee
Abstract:
When light illuminates the junction formed between a sharp metal tip and a sample, different mechanisms can con-tribute to the measured photo-induced force simultaneously. Of particular interest are the instantaneous force be-tween the induced dipoles in the tip and in the sample and the force related to thermal heating of the junction. A key difference between these two force mechanisms is their…
▽ More
When light illuminates the junction formed between a sharp metal tip and a sample, different mechanisms can con-tribute to the measured photo-induced force simultaneously. Of particular interest are the instantaneous force be-tween the induced dipoles in the tip and in the sample and the force related to thermal heating of the junction. A key difference between these two force mechanisms is their spectral behaviors. The magnitude of the thermal response follows a dissipative Lorentzian lineshape, which measures the heat exchange between light and matter, while the induced dipole response exhibits a dispersive spectrum and relates to the real part of the material polarizability. Be-cause the two interactions are sometimes comparable in magnitude, the origin of the nanoscale chemical selectivity in the recently developed photo-induced force microscopy (PiFM) is often unclear. Here, we demonstrate theoretically and experimentally how light absorption followed by nanoscale thermal expansion generates a photo-induced force in PiFM. Furthermore, we explain how this thermal force can be distinguished from the induced dipole force by tuning the relaxation time of samples. Our analysis presented here helps the interpretation of nanoscale chemical measure-ments of heterogeneous materials and sheds light on the nature of light-matter coupling in van der Waals materials.
△ Less
Submitted 7 March, 2018; v1 submitted 7 November, 2017;
originally announced November 2017.
-
Closing the loop between neural network simulators and the OpenAI Gym
Authors:
Jakob Jordan,
Philipp Weidel,
Abigail Morrison
Abstract:
Since the enormous breakthroughs in machine learning over the last decade, functional neural network models are of growing interest for many researchers in the field of computational neuroscience. One major branch of research is concerned with biologically plausible implementations of reinforcement learning, with a variety of different models developed over the recent years. However, most studies…
▽ More
Since the enormous breakthroughs in machine learning over the last decade, functional neural network models are of growing interest for many researchers in the field of computational neuroscience. One major branch of research is concerned with biologically plausible implementations of reinforcement learning, with a variety of different models developed over the recent years. However, most studies in this area are conducted with custom simulation scripts and manually implemented tasks. This makes it hard for other researchers to reproduce and build upon previous work and nearly impossible to compare the performance of different learning architectures. In this work, we present a novel approach to solve this problem, connecting benchmark tools from the field of machine learning and state-of-the-art neural network simulators from computational neuroscience. This toolchain enables researchers in both fields to make use of well-tested high-performance simulation software supporting biologically plausible neuron, synapse and network models and allows them to evaluate and compare their approach on the basis of standardized environments of varying complexity. We demonstrate the functionality of the toolchain by implementing a neuronal actor-critic architecture for reinforcement learning in the NEST simulator and successfully training it on two different environments from the OpenAI Gym.
△ Less
Submitted 17 September, 2017;
originally announced September 2017.
-
Technical Report: Improved Fourier Reconstruction using Jump Information with Applications to MRI
Authors:
Jade Larriva-Latt,
Angela Morrison,
Alison Radgowski,
Joseph Tobin,
Aditya Viswanathan,
Mark Iwen
Abstract:
Certain applications such as Magnetic Resonance Imaging (MRI) require the reconstruction of functions from Fourier spectral data. When the underlying functions are piecewise-smooth, standard Fourier approximation methods suffer from the Gibbs phenomenon - with associated oscillatory artifacts in the vicinity of edges and an overall reduced order of convergence in the approximation. This paper prop…
▽ More
Certain applications such as Magnetic Resonance Imaging (MRI) require the reconstruction of functions from Fourier spectral data. When the underlying functions are piecewise-smooth, standard Fourier approximation methods suffer from the Gibbs phenomenon - with associated oscillatory artifacts in the vicinity of edges and an overall reduced order of convergence in the approximation. This paper proposes an edge-augmented Fourier reconstruction procedure which uses only the first few Fourier coefficients of an underlying piecewise-smooth function to accurately estimate jump information and then incorporate it into a Fourier partial sum approximation. We provide both theoretical and empirical results showing the improved accuracy of the proposed method, as well as comparisons demonstrating superior performance over existing state-of-the-art sparse optimization-based methods. Extensions of the proposed techniques to functions of several variables are also addressed preliminarily. All code used to generate the results in this report are made publicly available.
△ Less
Submitted 12 October, 2016;
originally announced October 2016.
-
NESTML: a modeling language for spiking neurons
Authors:
Dimitri Plotnikov,
Bernhard Rumpe,
Inga Blundell,
Tammo Ippen,
Jochen Martin Eppler,
Abgail Morrison
Abstract:
Biological nervous systems exhibit astonishing complexity .Neuroscientists aim to capture this com- plexity by modeling and simulation of biological processes. Often very comple xm odels are nec- essary to depict the processes, which makes it dif fi cult to create these models. Powerful tools are thus necessary ,which enable neuroscientists to express models in acomprehensi ve and concise way and…
▽ More
Biological nervous systems exhibit astonishing complexity .Neuroscientists aim to capture this com- plexity by modeling and simulation of biological processes. Often very comple xm odels are nec- essary to depict the processes, which makes it dif fi cult to create these models. Powerful tools are thus necessary ,which enable neuroscientists to express models in acomprehensi ve and concise way and generate ef fi cient code for digital simulations. Se veral modeling languages for computational neuroscience ha ve been proposed [Gl10, Ra11]. Howe ver, as these languages seek simulator inde- pendence the ytypically only support asubset of the features desired by the modeler .Int his article, we present the modular and extensible domain speci fi cl anguage NESTML, which provides neuro- science domain concepts as fi rst-class language constructs and supports domain experts in creating neuron models for the neural simulation tool NEST .N ESTML and aset of example models are publically available on GitHub.
△ Less
Submitted 9 June, 2016;
originally announced June 2016.
-
Aqueous ammonium thiocyanate solutions as refractive index-matching fluids with low density and viscosity
Authors:
Daniel Borrero-Echeverry,
Benjamin C. A. Morrison
Abstract:
We show that aqueous solutions of ammonium thiocyanate (NH4SCN) can be used to match the index of refraction of several transparent materials commonly used in experiments, while maintaining low viscosity and density compared to other common refractive index-matching liquids. We present empirical models for estimating the index of refraction, density, and kinematic viscosity of these solutions as a…
▽ More
We show that aqueous solutions of ammonium thiocyanate (NH4SCN) can be used to match the index of refraction of several transparent materials commonly used in experiments, while maintaining low viscosity and density compared to other common refractive index-matching liquids. We present empirical models for estimating the index of refraction, density, and kinematic viscosity of these solutions as a function of temperature and concentration. Finally, we summarize the chemical compatibility of ammonium thiocyanate with materials commonly used in apparatus.
△ Less
Submitted 24 June, 2016; v1 submitted 24 May, 2016;
originally announced May 2016.
-
Closed loop interactions between spiking neural network and robotic simulators based on MUSIC and ROS
Authors:
Philipp Weidel,
Mikael Djurfeldt,
Renato Duarte,
Abigail Morrison
Abstract:
In order to properly assess the function and computational properties of simulated neural systems, it is necessary to account for the nature of the stimuli that drive the system. However, providing stimuli that are rich and yet both reproducible and amenable to experimental manipulations is technically challenging, and even more so if a closed-loop scenario is required. In this work, we present a…
▽ More
In order to properly assess the function and computational properties of simulated neural systems, it is necessary to account for the nature of the stimuli that drive the system. However, providing stimuli that are rich and yet both reproducible and amenable to experimental manipulations is technically challenging, and even more so if a closed-loop scenario is required. In this work, we present a novel approach to solve this problem, connecting robotics and neural network simulators. We implement a middleware solution that bridges the Robotic Operating System (ROS) to the Multi-Simulator Coordinator (MUSIC). This enables any robotic and neural simulators that implement the corresponding interfaces to be efficiently coupled, allowing real-time performance for a wide range of configurations. This work extends the toolset available for researchers in both neurorobotics and computational neuroscience, and creates the opportunity to perform closed-loop experiments of arbitrary complexity to address questions in multiple areas, including embodiment, agency, and reinforcement learning.
△ Less
Submitted 16 April, 2016;
originally announced April 2016.
-
Fluctuations in a Cosmology with a Space-Like Singularity and their Gauge Theory Dual Description
Authors:
Robert H. Brandenberger,
Yi-Fu Cai,
Sumit R. Das,
Elisa G. M. Ferreira,
Ian A. Morrison,
Yi Wang
Abstract:
We consider a time-dependent deformation of anti-de-Sitter (AdS) space-time which contains a cosmological "singularity" - a space-like region of high curvature. Making use of the AdS/CFT correspondence we can map the bulk dynamics onto the boundary. The boundary theory has a time dependent coupling constant which becomes small at times when the bulk space-time is highly curved. We investigate the…
▽ More
We consider a time-dependent deformation of anti-de-Sitter (AdS) space-time which contains a cosmological "singularity" - a space-like region of high curvature. Making use of the AdS/CFT correspondence we can map the bulk dynamics onto the boundary. The boundary theory has a time dependent coupling constant which becomes small at times when the bulk space-time is highly curved. We investigate the propagation of small fluctuations of a test scalar field from early times before the bulk singularity to late times after the singularity. Under the assumption that the AdS/CFT correspondence extends to deformed AdS space-times, we can map the bulk evolution of the scalar field onto the evolution of the boundary gauge field. The time evolution of linearized fluctuations is well defined in the boundary theory as long as the coupling remains finite, so that we can extend the boundary perturbations to late times after the singularity. Assuming that the spacetime in the future of the singularity has a weakly coupled region near the boundary, we reconstruct the bulk fluctuations after the singularity crossing making use of generic properties of boundary-to-bulk propagators. Finally, we extract the spectrum of the fluctuations at late times given some initial spectrum. We find that the spectral index is unchanged, but the amplitude increases due to the squeezing of the fluctuations during the course of the evolution. This investigation can teach us important lessons on how the spectrum of cosmological perturbations passes through a bounce which is singular from the bulk point of view but which is resolved using an ultraviolet complete theory of quantum gravity.
△ Less
Submitted 26 January, 2016; v1 submitted 2 January, 2016;
originally announced January 2016.
-
On higher spin symmetries in de Sitter QFTs
Authors:
Renato Costa,
Ian A. Morrison
Abstract:
We consider the consequences of global higher-spin symmetries in quantum field theories on a fixed de Sitter background of spacetime dimension $D \ge 3$. These symmetries enhance the symmetry group associated with the isometries of the de Sitter background and thus strongly constrain the dynamics of the theory. In particular, we consider the case when a higher spin charge acts linearly on a scalar…
▽ More
We consider the consequences of global higher-spin symmetries in quantum field theories on a fixed de Sitter background of spacetime dimension $D \ge 3$. These symmetries enhance the symmetry group associated with the isometries of the de Sitter background and thus strongly constrain the dynamics of the theory. In particular, we consider the case when a higher spin charge acts linearly on a scalar operator to leading order in a Fefferman-Graham expansion near the future/past conformal boundaries. We show that this implies that the expectation values of the operator inserted near the boundaries are asymptotically Gaussian. Thus, these operators have trivial cosmological spectra, and on global de Sitter these operators have only Gaussian correlations between operators inserted near future/past infinity. The latter result may be interpreted as an analogue of the Coleman-Mandula theorem for QFTs on de Sitter spacetime.
△ Less
Submitted 3 March, 2016; v1 submitted 20 November, 2015;
originally announced November 2015.
-
Motivic Donaldson--Thomas invariants of some quantized threefolds
Authors:
Alberto Cazzaniga,
Andrew Morrison,
Brent Pym,
Balazs Szendroi
Abstract:
This paper is motivated by the question of how motivic Donaldson--Thomas invariants behave in families. We compute the invariants for some simple families of noncommutative Calabi--Yau threefolds, defined by quivers with homogeneous potentials. These families give deformation quantizations of affine three-space, the resolved conifold, and the resolution of the transversal $A_n$-singularity. It tur…
▽ More
This paper is motivated by the question of how motivic Donaldson--Thomas invariants behave in families. We compute the invariants for some simple families of noncommutative Calabi--Yau threefolds, defined by quivers with homogeneous potentials. These families give deformation quantizations of affine three-space, the resolved conifold, and the resolution of the transversal $A_n$-singularity. It turns out that their invariants are generically constant, but jump at special values of the deformation parameter, such as roots of unity. The corresponding generating series are written in closed form, as plethystic exponentials of simple rational functions. While our results are limited by the standard dimensional reduction techniques that we employ, they nevertheless allow us to conjecture formulae for more interesting cases, such as the elliptic Sklyanin algebras.
△ Less
Submitted 27 October, 2015;
originally announced October 2015.
-
Probabilistic Formal Analysis of App Usage to Inform Redesign
Authors:
Oana Andrei,
Muffy Calder,
Matthew Chalmers,
Alistair Morrison,
Mattias Rost
Abstract:
This paper sets out a process of app analysis intended to support understanding of use but also redesign. From usage logs we infer activity patterns - Markov models - and employ probabilistic formal analysis to ask questions about the use of the app. The core of this paper's contribution is a bridging of stochastic and formal modelling, but we also describe the work to make that analytic core util…
▽ More
This paper sets out a process of app analysis intended to support understanding of use but also redesign. From usage logs we infer activity patterns - Markov models - and employ probabilistic formal analysis to ask questions about the use of the app. The core of this paper's contribution is a bridging of stochastic and formal modelling, but we also describe the work to make that analytic core utile within a design team. We illustrate our work via a case study of a mobile app presenting analytic findings and discussing how they are feeding into redesign. We had posited that two activity patterns indicated two separable sets of users, each of which might benefit from a differently tailored app version, but our subsequent analysis detailed users' interleaving of activity patterns over time - evidence speaking more in favour of redesign that supports each pattern in an integrated way. We uncover patterns consisting of brief glances at particular data and recommend them as possible candidates for new design work on widget extensions: small displays available while users use other apps.
△ Less
Submitted 27 October, 2015;
originally announced October 2015.