-
How Stable is Stable Diffusion under Recursive InPainting (RIP)?
Authors:
Javier Conde,
Miguel González,
Gonzalo Martínez,
Fernando Moral,
Elena Merino-Gómez,
Pedro Reviriego
Abstract:
Generative Artificial Intelligence image models have achieved outstanding performance in text-to-image generation and other tasks, such as inpainting that completes images with missing fragments. The performance of inpainting can be accurately measured by taking an image, removing some fragments, performing the inpainting to restore them, and comparing the results with the original image. Interest…
▽ More
Generative Artificial Intelligence image models have achieved outstanding performance in text-to-image generation and other tasks, such as inpainting that completes images with missing fragments. The performance of inpainting can be accurately measured by taking an image, removing some fragments, performing the inpainting to restore them, and comparing the results with the original image. Interestingly, inpainting can also be applied recursively, starting from an image, removing some parts, applying inpainting to reconstruct the image, and then starting the inpainting process again on the reconstructed image, and so forth. This process of recursively applying inpainting can lead to an image that is similar or completely different from the original one, depending on the fragments that are removed and the ability of the model to reconstruct them. Intuitively, stability, understood as the capability to recover an image that is similar to the original one even after many recursive inpainting operations, is a desirable feature and can be used as an additional performance metric for inpainting. The concept of stability is also being studied in the context of recursive training of generative AI models with their own data. Recursive inpainting is an inference-only recursive process whose understanding may complement ongoing efforts to study the behavior of generative AI models under training recursion. In this paper, the impact of recursive inpainting is studied for one of the most widely used image models: Stable Diffusion. The results show that recursive inpainting can lead to image collapse, so ending with a nonmeaningful image, and that the outcome depends on several factors such as the type of image, the size of the inpainting masks, and the number of iterations.
△ Less
Submitted 27 June, 2024;
originally announced July 2024.
-
Count-Min sketches for Telemetry: analysis of performance in P4 implementations
Authors:
José A. Hernández,
Davide Scano,
Filippo Cugini,
Gonzalo Martínez,
Natalia Koneva,
Alvaro Sánchez-Macián,
Óscar González de Dios
Abstract:
Monitoring streams of packets at 100~Gb/s and beyond requires using compact and efficient hashing-techniques like HyperLogLog (HLL) or Count-Min Sketch (CMS). In this work, we evaluate the uses and applications of Count-Min Sketch for Metro Networks employing P4-based packet-optical nodes. We provide dimensioning rules for CMS at 100~Gb/s and 400~Gb/s and evaluate its performance in a real impleme…
▽ More
Monitoring streams of packets at 100~Gb/s and beyond requires using compact and efficient hashing-techniques like HyperLogLog (HLL) or Count-Min Sketch (CMS). In this work, we evaluate the uses and applications of Count-Min Sketch for Metro Networks employing P4-based packet-optical nodes. We provide dimensioning rules for CMS at 100~Gb/s and 400~Gb/s and evaluate its performance in a real implementation testbed.
△ Less
Submitted 21 June, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
On complexity of colloid cellular automata
Authors:
Andrew Adamatzky,
Nic Roberts,
Raphael Fortulan,
Noushin Raeisi Kheirabadi,
Panagiotis Mougkogiannis,
Michail-Antisthenis Tsompanas,
Genaro J. Martinez,
Georgios Ch. Sirakoulis,
Alessandro Chiolerio
Abstract:
The colloid cellular automata do not imitate the physical structure of colloids but are governed by logical functions derived from the colloids. We analyse the space-time complexity of Boolean circuits derived from the electrical responses of colloids: ZnO (zinc oxide, an inorganic compound also known as calamine or zinc white, which naturally occurs as the mineral zincite), proteinoids (microsphe…
▽ More
The colloid cellular automata do not imitate the physical structure of colloids but are governed by logical functions derived from the colloids. We analyse the space-time complexity of Boolean circuits derived from the electrical responses of colloids: ZnO (zinc oxide, an inorganic compound also known as calamine or zinc white, which naturally occurs as the mineral zincite), proteinoids (microspheres and crystals of thermal abiotic proteins), and combinations thereof to electrical stimulation. To extract Boolean circuits from colloids, we send all possible configurations of two-, four-, and eight-bit binary strings, encoded as electrical potential values, to the colloids, record their responses, and thereby infer the Boolean functions they implement. We map the discovered functions onto the cell-state transition rules of cellular automata (arrays of binary state machines that update their states synchronously according to the same rule) -- the colloid cellular automata. We then analyse the phenomenology of the space-time configurations of the automata and evaluate their complexity using measures such as compressibility, Shannon entropy, Simpson diversity, and expressivity. A hierarchy of phenomenological and measurable space-time complexity is constructed.
△ Less
Submitted 31 May, 2024;
originally announced June 2024.
-
Open Source Conversational LLMs do not know most Spanish words
Authors:
Javier Conde,
Miguel González,
Nina Melero,
Raquel Ferrando,
Gonzalo Martínez,
Elena Merino-Gómez,
José Alberto Hernández,
Pedro Reviriego
Abstract:
The growing interest in Large Language Models (LLMs) and in particular in conversational models with which users can interact has led to the development of a large number of open-source chat LLMs. These models are evaluated on a wide range of benchmarks to assess their capabilities in answering questions or solving problems on almost any possible topic or to test their ability to reason or interpr…
▽ More
The growing interest in Large Language Models (LLMs) and in particular in conversational models with which users can interact has led to the development of a large number of open-source chat LLMs. These models are evaluated on a wide range of benchmarks to assess their capabilities in answering questions or solving problems on almost any possible topic or to test their ability to reason or interpret texts. Instead, the evaluation of the knowledge that these models have of the languages has received much less attention. For example, the words that they can recognize and use in different languages. In this paper, we evaluate the knowledge that open-source chat LLMs have of Spanish words by testing a sample of words in a reference dictionary. The results show that open-source chat LLMs produce incorrect meanings for an important fraction of the words and are not able to use most of the words correctly to write sentences with context. These results show how Spanish is left behind in the open-source LLM race and highlight the need to push for linguistic fairness in conversational LLMs ensuring that they provide similar performance across languages.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
Beware of Words: Evaluating the Lexical Richness of Conversational Large Language Models
Authors:
Gonzalo Martínez,
José Alberto Hernández,
Javier Conde,
Pedro Reviriego,
Elena Merino
Abstract:
The performance of conversational Large Language Models (LLMs) in general, and of ChatGPT in particular, is currently being evaluated on many different tasks, from logical reasoning or maths to answering questions on a myriad of topics. Instead, much less attention is being devoted to the study of the linguistic features of the texts generated by these LLMs. This is surprising since LLMs are model…
▽ More
The performance of conversational Large Language Models (LLMs) in general, and of ChatGPT in particular, is currently being evaluated on many different tasks, from logical reasoning or maths to answering questions on a myriad of topics. Instead, much less attention is being devoted to the study of the linguistic features of the texts generated by these LLMs. This is surprising since LLMs are models for language, and understanding how they use the language is important. Indeed, conversational LLMs are poised to have a significant impact on the evolution of languages as they may eventually dominate the creation of new text. This means that for example, if conversational LLMs do not use a word it may become less and less frequent and eventually stop being used altogether. Therefore, evaluating the linguistic features of the text they produce and how those depend on the model parameters is the first step toward understanding the potential impact of conversational LLMs on the evolution of languages. In this paper, we consider the evaluation of the lexical richness of the text generated by LLMs and how it depends on the model parameters. A methodology is presented and used to conduct a comprehensive evaluation of lexical richness using ChatGPT as a case study. The results show how lexical richness depends on the version of ChatGPT and some of its parameters, such as the presence penalty, or on the role assigned to the model. The dataset and tools used in our analysis are released under open licenses with the goal of drawing the much-needed attention to the evaluation of the linguistic features of LLM-generated text.
△ Less
Submitted 11 February, 2024;
originally announced February 2024.
-
Multiple Protein Profiler 1.0 (MPP): A webserver for predicting and visualizing physiochemical properties of proteins at the proteome level
Authors:
Gustavo Sganzerla Martinez,
Mansi Dutt,
Anuj Kumar,
David J Kelvin
Abstract:
Determining the physicochemical properties of a protein can reveal important insights in their structure, biological functions, stability, and interactions with other molecules. Although tools for computing properties of proteins already existed, we could not find a comprehensive tool that enables the calculations of multiple properties for multiple input proteins on the proteome level at once. Fa…
▽ More
Determining the physicochemical properties of a protein can reveal important insights in their structure, biological functions, stability, and interactions with other molecules. Although tools for computing properties of proteins already existed, we could not find a comprehensive tool that enables the calculations of multiple properties for multiple input proteins on the proteome level at once. Facing this limitation, we have developed Multiple Protein Profiler (MPP) 1.0 as an integrated tool that allows the profiling of 12 individual properties of multiple proteins in a significant manner. MPP provides a tabular and graphic visualization of properties of multiple proteins. The tool is freely accessible at https://mproteinprofiler.microbiologyandimmunology.dal.ca/
△ Less
Submitted 17 November, 2023;
originally announced December 2023.
-
Agile, User-Centered Design and Quality in Software Processes for Mobile Application Development Teaching
Authors:
Manuel Ignacio Castillo López,
Ana Libia Eslava Cervantes,
Gustavo de la Cruz Martínez,
Jorge Luis Ortega Arjona
Abstract:
Agile methods in undergraduate courses have been explored in an effort to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored user-centered Agile process for development of educational digital tools. This process is based on Scrum and Extreme Programming in combination with User Experience (UX) approaches. The c…
▽ More
Agile methods in undergraduate courses have been explored in an effort to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored user-centered Agile process for development of educational digital tools. This process is based on Scrum and Extreme Programming in combination with User Experience (UX) approaches. The course is executed in two phases: the first half of the semester presents theory on Agile and mobile applications development, the latter half is managed as a workshop where students develop for an actual client. The introduction of UX and user-centered design exploiting the close relationship with stakeholders expected from Agile processes allows for different quality features development. Since 2019 two of the projects have been extended and one project has been developed with the described process and course alumni. Students and stakeholders have found value in the generated products and process.
△ Less
Submitted 25 September, 2023;
originally announced November 2023.
-
Establishing Vocabulary Tests as a Benchmark for Evaluating Large Language Models
Authors:
Gonzalo Martínez,
Javier Conde,
Elena Merino-Gómez,
Beatriz Bermúdez-Margaretto,
José Alberto Hernández,
Pedro Reviriego,
Marc Brysbaert
Abstract:
Vocabulary tests, once a cornerstone of language modeling evaluation, have been largely overlooked in the current landscape of Large Language Models (LLMs) like Llama, Mistral, and GPT. While most LLM evaluation benchmarks focus on specific tasks or domain-specific knowledge, they often neglect the fundamental linguistic aspects of language understanding and production. In this paper, we advocate…
▽ More
Vocabulary tests, once a cornerstone of language modeling evaluation, have been largely overlooked in the current landscape of Large Language Models (LLMs) like Llama, Mistral, and GPT. While most LLM evaluation benchmarks focus on specific tasks or domain-specific knowledge, they often neglect the fundamental linguistic aspects of language understanding and production. In this paper, we advocate for the revival of vocabulary tests as a valuable tool for assessing LLM performance. We evaluate seven LLMs using two vocabulary test formats across two languages and uncover surprising gaps in their lexical knowledge. These findings shed light on the intricacies of LLM word representations, their learning mechanisms, and performance variations across models and languages. Moreover, the ability to automatically generate and perform vocabulary tests offers new opportunities to expand the approach and provide a more complete picture of LLMs' language skills.
△ Less
Submitted 29 January, 2024; v1 submitted 23 October, 2023;
originally announced October 2023.
-
How many words does ChatGPT know? The answer is ChatWords
Authors:
Gonzalo Martínez,
Javier Conde,
Pedro Reviriego,
Elena Merino-Gómez,
José Alberto Hernández,
Fabrizio Lombardi
Abstract:
The introduction of ChatGPT has put Artificial Intelligence (AI) Natural Language Processing (NLP) in the spotlight. ChatGPT adoption has been exponential with millions of users experimenting with it in a myriad of tasks and application domains with impressive results. However, ChatGPT has limitations and suffers hallucinations, for example producing answers that look plausible but they are comple…
▽ More
The introduction of ChatGPT has put Artificial Intelligence (AI) Natural Language Processing (NLP) in the spotlight. ChatGPT adoption has been exponential with millions of users experimenting with it in a myriad of tasks and application domains with impressive results. However, ChatGPT has limitations and suffers hallucinations, for example producing answers that look plausible but they are completely wrong. Evaluating the performance of ChatGPT and similar AI tools is a complex issue that is being explored from different perspectives. In this work, we contribute to those efforts with ChatWords, an automated test system, to evaluate ChatGPT knowledge of an arbitrary set of words. ChatWords is designed to be extensible, easy to use, and adaptable to evaluate also other NLP AI tools. ChatWords is publicly available and its main goal is to facilitate research on the lexical knowledge of AI tools. The benefits of ChatWords are illustrated with two case studies: evaluating the knowledge that ChatGPT has of the Spanish lexicon (taken from the official dictionary of the "Real Academia Española") and of the words that appear in the Quixote, the well-known novel written by Miguel de Cervantes. The results show that ChatGPT is only able to recognize approximately 80% of the words in the dictionary and 90% of the words in the Quixote, in some cases with an incorrect meaning. The implications of the lexical knowledge of NLP AI tools and potential applications of ChatWords are also discussed providing directions for further work on the study of the lexical knowledge of AI tools.
△ Less
Submitted 28 September, 2023;
originally announced September 2023.
-
Boundary Peeling: Outlier Detection Method Using One-Class Peeling
Authors:
Sheikh Arafat,
Na Sun,
Maria L. Weese,
Waldyn G. Martinez
Abstract:
Unsupervised outlier detection constitutes a crucial phase within data analysis and remains a dynamic realm of research. A good outlier detection algorithm should be computationally efficient, robust to tuning parameter selection, and perform consistently well across diverse underlying data distributions. We introduce One-Class Boundary Peeling, an unsupervised outlier detection algorithm. One-cla…
▽ More
Unsupervised outlier detection constitutes a crucial phase within data analysis and remains a dynamic realm of research. A good outlier detection algorithm should be computationally efficient, robust to tuning parameter selection, and perform consistently well across diverse underlying data distributions. We introduce One-Class Boundary Peeling, an unsupervised outlier detection algorithm. One-class Boundary Peeling uses the average signed distance from iteratively-peeled, flexible boundaries generated by one-class support vector machines. One-class Boundary Peeling has robust hyperparameter settings and, for increased flexibility, can be cast as an ensemble method. In synthetic data simulations One-Class Boundary Peeling outperforms all state of the art methods when no outliers are present while maintaining comparable or superior performance in the presence of outliers, as compared to benchmark methods. One-Class Boundary Peeling performs competitively in terms of correct classification, AUC, and processing time using common benchmark data sets.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Expanding Mars Climate Modeling: Interpretable Machine Learning for Modeling MSL Relative Humidity
Authors:
Nour Abdelmoneim,
Dattaraj B. Dhuri,
Dimitra Atri,
Germán Martínez
Abstract:
For the past several decades, numerous attempts have been made to model the climate of Mars with extensive studies focusing on the planet's dynamics and the understanding of its climate. While physical modeling and data assimilation approaches have made significant progress, uncertainties persist in comprehensively capturing and modeling the complexities of Martian climate. In this work, we propos…
▽ More
For the past several decades, numerous attempts have been made to model the climate of Mars with extensive studies focusing on the planet's dynamics and the understanding of its climate. While physical modeling and data assimilation approaches have made significant progress, uncertainties persist in comprehensively capturing and modeling the complexities of Martian climate. In this work, we propose a novel approach to Martian climate modeling by leveraging machine learning techniques that have shown remarkable success in Earth climate modeling. Our study presents a deep neural network designed to accurately model relative humidity in Gale Crater, as measured by NASA's Mars Science Laboratory ``Curiosity'' rover. By utilizing simulated meteorological variables produced by the Mars Planetary Climate Model, a robust Global Circulation Model, our model accurately predicts relative humidity with a mean error of 3\% and an $R^2$ score of 0.92. Furthermore, we present an approach to predict quantile ranges of relative humidity, catering to applications that require a range of values. To address the challenge of interpretability associated with machine learning models, we utilize an interpretable model architecture and conduct an in-depth analysis of its internal mechanisms and decision making processes. We find that our neural network can effectively model relative humidity at Gale crater using a few meteorological variables, with the monthly mean surface H$_2$O layer, planetary boundary layer height, convective wind speed, and solar zenith angle being the primary contributors to the model predictions. In addition to providing a fast and efficient method to modeling climate variables on Mars, this modeling approach can also be used to expand on current datasets by filling spatial and temporal gaps in observations.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Applying User Experience and User-Centered Design Software Processes in Undergraduate Mobile Application Development Teaching
Authors:
Manuel Ignacio Castillo López,
Ana Libia Eslava Cervantes,
Gustavo de la Cruz Martínez
Abstract:
Agile methods in undergraduate courses have been explored by various authors looking to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored agile process for development of educational software tools. This process is based on both Scrum and Extreme Programming in combination with User Experience (UX) and User-Ce…
▽ More
Agile methods in undergraduate courses have been explored by various authors looking to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored agile process for development of educational software tools. This process is based on both Scrum and Extreme Programming in combination with User Experience (UX) and User-Centered Design (UCD) approaches. The course is executed in two phases: the first half of the course's semester presents theory on agile and mobile applications development, the latter half is managed as a workshop where students develop for an actual client. The introduction of UX and UCD exploiting the close relationship with stakeholders expected from an agile process can enhance Quality in Use features. Since 2019 two of the projects have been extended in agreement between the client and students. Students, clients and users have found value in the generated products.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Playing with Words: Comparing the Vocabulary and Lexical Richness of ChatGPT and Humans
Authors:
Pedro Reviriego,
Javier Conde,
Elena Merino-Gómez,
Gonzalo Martínez,
José Alberto Hernández
Abstract:
The introduction of Artificial Intelligence (AI) generative language models such as GPT (Generative Pre-trained Transformer) and tools such as ChatGPT has triggered a revolution that can transform how text is generated. This has many implications, for example, as AI-generated text becomes a significant fraction of the text, would this have an effect on the language capabilities of readers and also…
▽ More
The introduction of Artificial Intelligence (AI) generative language models such as GPT (Generative Pre-trained Transformer) and tools such as ChatGPT has triggered a revolution that can transform how text is generated. This has many implications, for example, as AI-generated text becomes a significant fraction of the text, would this have an effect on the language capabilities of readers and also on the training of newer AI tools? Would it affect the evolution of languages? Focusing on one specific aspect of the language: words; will the use of tools such as ChatGPT increase or reduce the vocabulary used or the lexical richness? This has implications for words, as those not included in AI-generated content will tend to be less and less popular and may eventually be lost. In this work, we perform an initial comparison of the vocabulary and lexical richness of ChatGPT and humans when performing the same tasks. In more detail, two datasets containing the answers to different types of questions answered by ChatGPT and humans, and a third dataset in which ChatGPT paraphrases sentences and questions are used. The analysis shows that ChatGPT tends to use fewer distinct words and lower lexical richness than humans. These results are very preliminary and additional datasets and ChatGPT configurations have to be evaluated to extract more general conclusions. Therefore, further research is needed to understand how the use of ChatGPT and more broadly generative AI tools will affect the vocabulary and lexical richness in different types of text and languages.
△ Less
Submitted 31 August, 2023; v1 submitted 14 August, 2023;
originally announced August 2023.
-
CohortFinder: an open-source tool for data-driven partitioning of biomedical image cohorts to yield robust machine learning models
Authors:
Fan Fan,
Georgia Martinez,
Thomas Desilvio,
John Shin,
Yijiang Chen,
Bangchen Wang,
Takaya Ozeki,
Maxime W. Lafarge,
Viktor H. Koelzer,
Laura Barisoni,
Anant Madabhushi,
Satish E. Viswanath,
Andrew Janowczyk
Abstract:
Batch effects (BEs) refer to systematic technical differences in data collection unrelated to biological variations whose noise is shown to negatively impact machine learning (ML) model generalizability. Here we release CohortFinder, an open-source tool aimed at mitigating BEs via data-driven cohort partitioning. We demonstrate CohortFinder improves ML model performance in downstream medical image…
▽ More
Batch effects (BEs) refer to systematic technical differences in data collection unrelated to biological variations whose noise is shown to negatively impact machine learning (ML) model generalizability. Here we release CohortFinder, an open-source tool aimed at mitigating BEs via data-driven cohort partitioning. We demonstrate CohortFinder improves ML model performance in downstream medical image processing tasks. CohortFinder is freely available for download at cohortfinder.com.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
An Analysis of Dialogue Repair in Virtual Voice Assistants
Authors:
Matthew Carson Galbraith,
Mireia Gómez i Martínez
Abstract:
Language speakers often use what are known as repair initiators to mend fundamental disconnects that occur between them during verbal communication. Previous research in this field has mainly focused on the human-to-human use of repair initiator. We proposed an examination of dialogue repair structure wherein the dialogue initiator is human and the party that initiates or responds to the repair is…
▽ More
Language speakers often use what are known as repair initiators to mend fundamental disconnects that occur between them during verbal communication. Previous research in this field has mainly focused on the human-to-human use of repair initiator. We proposed an examination of dialogue repair structure wherein the dialogue initiator is human and the party that initiates or responds to the repair is a virtual assistant. This study examined the use of repair initiators in both English and Spanish with two popular assistants, Google Assistant and Apple's Siri. Our aim was to codify the differences, if any, in responses by voice assistants to dialogues in need of repair as compared to human-human dialogues also in need of repair. Ultimately the data demonstrated that not only were there differences between human-assistant and human-human dialogue repair strategies, but that there were likewise differences among the assistants and the languages studied.
△ Less
Submitted 13 July, 2023;
originally announced July 2023.
-
Towards Understanding the Interplay of Generative Artificial Intelligence and the Internet
Authors:
Gonzalo Martínez,
Lauren Watson,
Pedro Reviriego,
José Alberto Hernández,
Marc Juarez,
Rik Sarkar
Abstract:
The rapid adoption of generative Artificial Intelligence (AI) tools that can generate realistic images or text, such as DALL-E, MidJourney, or ChatGPT, have put the societal impacts of these technologies at the center of public debate. These tools are possible due to the massive amount of data (text and images) that is publicly available through the Internet. At the same time, these generative AI…
▽ More
The rapid adoption of generative Artificial Intelligence (AI) tools that can generate realistic images or text, such as DALL-E, MidJourney, or ChatGPT, have put the societal impacts of these technologies at the center of public debate. These tools are possible due to the massive amount of data (text and images) that is publicly available through the Internet. At the same time, these generative AI tools become content creators that are already contributing to the data that is available to train future models. Therefore, future versions of generative AI tools will be trained with a mix of human-created and AI-generated content, causing a potential feedback loop between generative AI and public data repositories. This interaction raises many questions: how will future versions of generative AI tools behave when trained on a mixture of real and AI generated data? Will they evolve and improve with the new data sets or on the contrary will they degrade? Will evolution introduce biases or reduce diversity in subsequent generations of generative AI tools? What are the societal implications of the possible degradation of these models? Can we mitigate the effects of this feedback loop? In this document, we explore the effect of this interaction and report some initial results using simple diffusion models trained with various image datasets. Our results show that the quality and diversity of the generated images can degrade over time suggesting that incorporating AI-created data can have undesired effects on future versions of generative models.
△ Less
Submitted 8 June, 2023;
originally announced June 2023.
-
Securing Verified IO Programs Against Unverified Code in F*
Authors:
Cezar-Constantin Andrici,
Stefan Ciobaca,
Catalin Hritcu,
Guido Martínez,
Exequiel Rivas,
Éric Tanter,
Théo Winterhalter
Abstract:
We introduce SCIO*, a formally secure compilation framework for statically verified partial programs performing input-output (IO). The source language is an F* subset in which a verified program interacts with its IO-performing context via a higher-order interface that includes refinement types as well as pre- and post-conditions about past IO events. The target language is a smaller F* subset in…
▽ More
We introduce SCIO*, a formally secure compilation framework for statically verified partial programs performing input-output (IO). The source language is an F* subset in which a verified program interacts with its IO-performing context via a higher-order interface that includes refinement types as well as pre- and post-conditions about past IO events. The target language is a smaller F* subset in which the compiled program is linked with an adversarial context that has an interface without refinement types, pre-conditions, or concrete post-conditions. To bridge this interface gap and make compilation and linking secure we propose a formally verified combination of higher-order contracts and reference monitoring for recording and controlling IO operations. Compilation uses contracts to convert the logical assumptions the program makes about the context into dynamic checks on each context-program boundary crossing. These boundary checks can depend on information about past IO events stored in the state of the monitor. But these checks cannot stop the adversarial target context before it performs dangerous IO operations. Therefore linking in SCIO* additionally forces the context to perform all IO actions via a secure IO library, which uses reference monitoring to dynamically enforce an access control policy before each IO operation. We prove in F* that SCIO* soundly enforces a global trace property for the compiled verified program linked with the untrusted context. Moreover, we prove in F* that SCIO* satisfies by construction Robust Relational Hyperproperty Preservation, a very strong secure compilation criterion. Finally, we illustrate SCIO* at work on a simple web server example.
△ Less
Submitted 15 November, 2023; v1 submitted 2 March, 2023;
originally announced March 2023.
-
Combining Generative Artificial Intelligence (AI) and the Internet: Heading towards Evolution or Degradation?
Authors:
Gonzalo Martínez,
Lauren Watson,
Pedro Reviriego,
José Alberto Hernández,
Marc Juarez,
Rik Sarkar
Abstract:
In the span of a few months, generative Artificial Intelligence (AI) tools that can generate realistic images or text have taken the Internet by storm, making them one of the technologies with fastest adoption ever. Some of these generative AI tools such as DALL-E, MidJourney, or ChatGPT have gained wide public notoriety. Interestingly, these tools are possible because of the massive amount of dat…
▽ More
In the span of a few months, generative Artificial Intelligence (AI) tools that can generate realistic images or text have taken the Internet by storm, making them one of the technologies with fastest adoption ever. Some of these generative AI tools such as DALL-E, MidJourney, or ChatGPT have gained wide public notoriety. Interestingly, these tools are possible because of the massive amount of data (text and images) available on the Internet. The tools are trained on massive data sets that are scraped from Internet sites. And now, these generative AI tools are creating massive amounts of new data that are being fed into the Internet. Therefore, future versions of generative AI tools will be trained with Internet data that is a mix of original and AI-generated data. As time goes on, a mixture of original data and data generated by different versions of AI tools will populate the Internet. This raises a few intriguing questions: how will future versions of generative AI tools behave when trained on a mixture of real and AI generated data? Will they evolve with the new data sets or degenerate? Will evolution introduce biases in subsequent generations of generative AI tools? In this document, we explore these questions and report some very initial simulation results using a simple image-generation AI tool. These results suggest that the quality of the generated images degrades as more AI-generated data is used for training thus suggesting that generative AI may degenerate. Although these results are preliminary and cannot be generalised without further study, they serve to illustrate the potential issues of the interaction between generative AI and the Internet.
△ Less
Submitted 17 February, 2023;
originally announced March 2023.
-
Pre-screening breast cancer with machine learning and deep learning
Authors:
Rolando Gonzales Martinez,
Daan-Max van Dongen
Abstract:
We suggest that deep learning can be used for pre-screening cancer by analyzing demographic and anthropometric information of patients, as well as biological markers obtained from routine blood samples and relative risks obtained from meta-analysis and international databases. We applied feature selection algorithms to a database of 116 women, including 52 healthy women and 64 women diagnosed with…
▽ More
We suggest that deep learning can be used for pre-screening cancer by analyzing demographic and anthropometric information of patients, as well as biological markers obtained from routine blood samples and relative risks obtained from meta-analysis and international databases. We applied feature selection algorithms to a database of 116 women, including 52 healthy women and 64 women diagnosed with breast cancer, to identify the best pre-screening predictors of cancer. We utilized the best predictors to perform k-fold Monte Carlo cross-validation experiments that compare deep learning against traditional machine learning algorithms. Our results indicate that a deep learning model with an input-layer architecture that is fine-tuned using feature selection can effectively distinguish between patients with and without cancer. Additionally, compared to machine learning, deep learning has the lowest uncertainty in its predictions. These findings suggest that deep learning algorithms applied to cancer pre-screening offer a radiation-free, non-invasive, and affordable complement to screening methods based on imagery. The implementation of deep learning algorithms in cancer pre-screening offer opportunities to identify individuals who may require imaging-based screening, can encourage self-examination, and decrease the psychological externalities associated with false positives in cancer screening. The integration of deep learning algorithms for both screening and pre-screening will ultimately lead to earlier detection of malignancy, reducing the healthcare and societal burden associated to cancer treatment.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
Round Trip Time (RTT) Delay in the Internet: Analysis and Trends
Authors:
Gonzalo Martínez,
José Alberto Hernández,
Pedro Reviriego,
Paul Reinheimer
Abstract:
Both capacity and latency are crucial performance metrics for the optimal operation of most networking services and applications, from online gaming to futuristic holographic-type communications. Networks worldwide have witnessed important breakthroughs in terms of capacity, including fibre introduction everywhere, new radio technologies and faster core networks. However, the impact of these capac…
▽ More
Both capacity and latency are crucial performance metrics for the optimal operation of most networking services and applications, from online gaming to futuristic holographic-type communications. Networks worldwide have witnessed important breakthroughs in terms of capacity, including fibre introduction everywhere, new radio technologies and faster core networks. However, the impact of these capacity upgrades on end-to-end delay is not straightforward as traffic has also grown exponentially. This article overviews the current status of end-to-end latency on different regions and continents worldwide and how far these are from the theoretical minimum baseline, given by the speed of light propagation over an optical fibre. We observe that the trend in the last decade goes toward latency reduction (in spite of the ever-increasing annual traffic growth), but still there are important differences between countries.
△ Less
Submitted 8 June, 2023; v1 submitted 18 January, 2023;
originally announced January 2023.
-
Hyper-Spectral Imaging for Overlapping Plastic Flakes Segmentation
Authors:
Guillem Martinez,
Maya Aghaei,
Martin Dijkstra,
Bhalaji Nagarajan,
Femke Jaarsma,
Jaap van de Loosdrecht,
Petia Radeva,
Klaas Dijkstra
Abstract:
Given the hyper-spectral imaging unique potentials in grasping the polymer characteristics of different materials, it is commonly used in sorting procedures. In a practical plastic sorting scenario, multiple plastic flakes may overlap which depending on their characteristics, the overlap can be reflected in their spectral signature. In this work, we use hyper-spectral imaging for the segmentation…
▽ More
Given the hyper-spectral imaging unique potentials in grasping the polymer characteristics of different materials, it is commonly used in sorting procedures. In a practical plastic sorting scenario, multiple plastic flakes may overlap which depending on their characteristics, the overlap can be reflected in their spectral signature. In this work, we use hyper-spectral imaging for the segmentation of three types of plastic flakes and their possible overlapping combinations. We propose an intuitive and simple multi-label encoding approach, bitfield encoding, to account for the overlapping regions. With our experiments, we show that the bitfield encoding improves over the baseline single-label approach and we further demonstrate its potential in predicting multiple labels for overlapping classes even when the model is only trained with non-overlapping classes.
△ Less
Submitted 23 March, 2022;
originally announced March 2022.
-
Computing with Modular Robots
Authors:
Genaro J. Martinez,
Andrew Adamatzky,
Ricardo Q. Figueroa,
Eric Schweikardt,
Dmitry A. Zaitsev,
Ivan Zelinka,
Luz N. Oliva-Moreno
Abstract:
Propagating patterns are used to transfer and process information in chemical and physical prototypes of unconventional computing devices. Logical values are represented by fronts of traveling diffusive, trigger or phase waves. We apply this concept of pattern based computation to develop experimental prototypes of computing circuits implemented in small modular robots. In the experimental prototy…
▽ More
Propagating patterns are used to transfer and process information in chemical and physical prototypes of unconventional computing devices. Logical values are represented by fronts of traveling diffusive, trigger or phase waves. We apply this concept of pattern based computation to develop experimental prototypes of computing circuits implemented in small modular robots. In the experimental prototypes the modular robots Cubelets are concatenated into channels and junction. The structures developed by Cubelets propagate signals in parallel and asynchronously. The approach is illustrated with a working circuit of a one-bit full adder. Complementarily a formalization of these constructions are developed across Sleptsov nets. Finally, a perspective to swarm dynamics is discussed.
△ Less
Submitted 14 February, 2022;
originally announced February 2022.
-
A Survey of Passive Sensing in the Workplace
Authors:
Subigya Nepal,
Gonzalo J. Martinez,
Arvind Pillai,
Koustuv Saha,
Shayan Mirjafari,
Vedant Das Swain,
Xuhai Xu,
Pino G. Audia,
Munmun De Choudhury,
Anind K. Dey,
Aaron Striegel,
Andrew T. Campbell
Abstract:
As emerging technologies increasingly integrate into all facets of our lives, the workplace stands at the forefront of potential transformative changes. A notable development in this realm is the advent of passive sensing technology, designed to enhance both cognitive and physical capabilities by monitoring human behavior. This paper reviews current research on the application of passive sensing t…
▽ More
As emerging technologies increasingly integrate into all facets of our lives, the workplace stands at the forefront of potential transformative changes. A notable development in this realm is the advent of passive sensing technology, designed to enhance both cognitive and physical capabilities by monitoring human behavior. This paper reviews current research on the application of passive sensing technology in the workplace, focusing on its impact on employee wellbeing and productivity. Additionally, we explore unresolved issues and outline prospective pathways for the incorporation of passive sensing in future workplaces.
△ Less
Submitted 30 March, 2024; v1 submitted 9 January, 2022;
originally announced January 2022.
-
SteelCore: An Extensible Concurrent Separation Logic for Effectful Dependently Typed Programs
Authors:
Nikhil Swamy,
Aseem Rastogi,
Aymeric Fromherz,
Denis Merigoux,
Danel Ahman,
Guido Martínez
Abstract:
Much recent research has been devoted to modeling effects within type theory. Building on this work, we observe that effectful type theories can provide a foundation on which to build semantics for more complex programming constructs and program logics, extending the reasoning principles that apply within the host effectful type theory itself. Concretely, our main contribution is a semantics for c…
▽ More
Much recent research has been devoted to modeling effects within type theory. Building on this work, we observe that effectful type theories can provide a foundation on which to build semantics for more complex programming constructs and program logics, extending the reasoning principles that apply within the host effectful type theory itself. Concretely, our main contribution is a semantics for concurrent separation logic (CSL) within the F* proof assistant in a manner that enables dependently typed, effectful F* programs to make use of concurrency and to be specified and verified using a full-featured, extensible CSL. In contrast to prior approaches, we directly derive the partial-correctness Hoare rules for CSL from the denotation of computations in the effectful semantics of non-deterministically interleaved atomic actions. Demonstrating the flexibility of our semantics, we build generic, verified libraries that support various concurrency constructs, ranging from dynamically allocated, storable spin locks, to protocol-indexed channels. We conclude that our effectful semantics provides a simple yet expressive basis on which to layer domain-specific languages and logics for verified, concurrent programming.
△ Less
Submitted 30 November, 2021;
originally announced November 2021.
-
On Wave-Based Majority Gates with Cellular Automata
Authors:
Genaro J. Martinez,
Andrew Adamatzky,
Shigeru Ninagawa,
Kenichi Morita
Abstract:
We demonstrate a discrete implementation of a wave-based majority gate in a chaotic Life-like cellular automaton. The gate functions via controlling of patterns' propagation into stationary channels. The gate presented is realisable in many living and non-living substrates that show wave-like activity of its space-time dynamics or pattern propagation. In the gate a symmetric pattern represents a b…
▽ More
We demonstrate a discrete implementation of a wave-based majority gate in a chaotic Life-like cellular automaton. The gate functions via controlling of patterns' propagation into stationary channels. The gate presented is realisable in many living and non-living substrates that show wave-like activity of its space-time dynamics or pattern propagation. In the gate a symmetric pattern represents a binary value 0 while a non-symmetric pattern represents a binary value 1. Origination of the patterns and their symmetry type are encoded by the particle reactions at the beginning of computation. The patterns propagate in channels of the gate and compete for the space at the intersection of the channels. We implement 3-inputs majority gates using a W topology showing additional implementations of 5-inputs majority gates and one tree (cascade) majority gate.
△ Less
Submitted 9 October, 2021;
originally announced October 2021.
-
Requirements-Aided Automatic Test Case Generation for Industrial Cyber-physical Systems
Authors:
Roopak Sinha,
Cheng Pang,
Gerardo Santillán Martínez,
Juha Kuronen,
Valeriy Vyatkin
Abstract:
Industrial cyber-physical systems require complex distributed software to orchestrate many heterogeneous mechatronic components and control multiple physical processes. Industrial automation software is typically developed in a model-driven fashion where abstractions of physical processes called plant models are co-developed and iteratively refined along with the control code. Testing such multi-d…
▽ More
Industrial cyber-physical systems require complex distributed software to orchestrate many heterogeneous mechatronic components and control multiple physical processes. Industrial automation software is typically developed in a model-driven fashion where abstractions of physical processes called plant models are co-developed and iteratively refined along with the control code. Testing such multi-dimensional systems is extremely difficult because often models might not be accurate, do not correspond accurately with subsequent refinements, and the software must eventually be tested on the real plant, especially in safety-critical systems like nuclear plants. This paper proposes a framework wherein high-level functional requirements are used to automatically generate test cases for designs at all abstraction levels in the model-driven engineering process. Requirements are initially specified in natural language and then analyzed and specified using a formalized ontology. The requirements ontology is then refined along with controller and plant models during design and development stages such that test cases can be generated automatically at any stage. A representative industrial water process system case study illustrates the strengths of the proposed formalism. The requirements meta-model proposed by the CESAR European project is used for requirements engineering while IEC 61131-3 and model-driven concepts are used in the design and development phases. A tool resulting from the proposed framework called REBATE (Requirements Based Automatic Testing Engine) is used to generate and execute test cases for increasingly concrete controller and plant models.
△ Less
Submitted 16 August, 2021;
originally announced August 2021.
-
Visualization of the Computation Process of a Universal Register Machine
Authors:
Shigeru Ninagawa,
Genaro J. Martinez
Abstract:
Universal register machine, a formal model of computation, can be emulated on the array of the Game of Life, a two-dimensional cellular automaton. We perform spectral analysis on the computation dynamical process of the universal register machine on the Game of Life. The array is divided into small sectors and the power spectrum is calculated from the evolution in each sector. The power spectrum c…
▽ More
Universal register machine, a formal model of computation, can be emulated on the array of the Game of Life, a two-dimensional cellular automaton. We perform spectral analysis on the computation dynamical process of the universal register machine on the Game of Life. The array is divided into small sectors and the power spectrum is calculated from the evolution in each sector. The power spectrum can be classified into four categories by its shape; null, white noise, sharp peaks, and power law. By representing the shape of power spectrum by a mark, we can visualize the activity of the sector during the computation process. For example, the track of pulse moving between components of the universal register machine and the position of frequently modified registers can be identified. This method can expose the functional difference in each region of computing machine.
△ Less
Submitted 22 May, 2021; v1 submitted 7 April, 2021;
originally announced April 2021.
-
White Paper Machine Learning in Certified Systems
Authors:
Hervé Delseny,
Christophe Gabreau,
Adrien Gauffriau,
Bernard Beaudouin,
Ludovic Ponsolle,
Lucian Alecu,
Hugues Bonnin,
Brice Beltran,
Didier Duchel,
Jean-Brice Ginestet,
Alexandre Hervieu,
Ghilaine Martinez,
Sylvain Pasquet,
Kevin Delmas,
Claire Pagetti,
Jean-Marc Gabriel,
Camille Chapdelaine,
Sylvaine Picard,
Mathieu Damour,
Cyril Cappi,
Laurent Gardès,
Florence De Grancey,
Eric Jenn,
Baptiste Lefevre,
Gregory Flandin
, et al. (3 additional authors not shown)
Abstract:
Machine Learning (ML) seems to be one of the most promising solution to automate partially or completely some of the complex tasks currently realized by humans, such as driving vehicles, recognizing voice, etc. It is also an opportunity to implement and embed new capabilities out of the reach of classical implementation techniques. However, ML techniques introduce new potential risks. Therefore, t…
▽ More
Machine Learning (ML) seems to be one of the most promising solution to automate partially or completely some of the complex tasks currently realized by humans, such as driving vehicles, recognizing voice, etc. It is also an opportunity to implement and embed new capabilities out of the reach of classical implementation techniques. However, ML techniques introduce new potential risks. Therefore, they have only been applied in systems where their benefits are considered worth the increase of risk. In practice, ML techniques raise multiple challenges that could prevent their use in systems submitted to certification constraints. But what are the actual challenges? Can they be overcome by selecting appropriate ML techniques, or by adopting new engineering or certification practices? These are some of the questions addressed by the ML Certification 3 Workgroup (WG) set-up by the Institut de Recherche Technologique Saint Exupéry de Toulouse (IRT), as part of the DEEL Project.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
Designing an Interactive Visualization System for Monitoring Participant Compliance in a Large-Scale, Longitudinal Study
Authors:
Poorna Talkad Sukumar,
Thomas Breideband,
Gonzalo Martinez,
Megan Caruso,
Sierra Rose,
Cooper Steputis,
Sidney D'Mello,
Gloria Mark,
Aaron Striegel
Abstract:
Frequent monitoring of participant compliance is necessary when conducting large-scale, longitudinal studies to ensure that the collected data is of sufficiently high quality. While the need for achieving high compliance has been underscored and there are discussions on incentives and factors affecting compliance, little is shared about the actual processes and tools used for monitoring compliance…
▽ More
Frequent monitoring of participant compliance is necessary when conducting large-scale, longitudinal studies to ensure that the collected data is of sufficiently high quality. While the need for achieving high compliance has been underscored and there are discussions on incentives and factors affecting compliance, little is shared about the actual processes and tools used for monitoring compliance in such studies. Monitoring participant compliance with respect to multi-modal data can be a tedious process, especially if there are only a few personnel involved. In this case study, we describe the iterative design of an interactive visualization system we developed for monitoring compliance and refined based on changing requirements in an ongoing study. We find that the visualization system, leveraging the digital medium, both facilitates the exploratory tasks of monitoring participant compliance and supports asynchronous collaboration among non-co-located researchers. Our documented requirements for checking participant compliance as well as the design of the visualization system can help inform the compliance-monitoring process in future studies.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Random Expansion Method for the Generation of Complex Cellular Automata
Authors:
Juan Carlos Seck-Tuoh-Mora,
Norberto Hernandez-Romero,
Joselito Medina-Marin,
Genaro J. Martinez,
Irving Barragan-Vite
Abstract:
The emergence of complex behaviors in cellular automata is an area that has been widely developed in recent years with the intention to generate and analyze automata that produce space-moving patterns or gliders that interact in a periodic background. Frequently, this type of automata has been found through either an exhaustive search or a meticulous construction of the evolution rule. In this stu…
▽ More
The emergence of complex behaviors in cellular automata is an area that has been widely developed in recent years with the intention to generate and analyze automata that produce space-moving patterns or gliders that interact in a periodic background. Frequently, this type of automata has been found through either an exhaustive search or a meticulous construction of the evolution rule. In this study, the specification of cellular automata with complex behaviors was obtained by utilizing randomly generated specimens. In particular, it proposed that a cellular automaton of $n$ states should be specified at random and then extended to another automaton with a higher number of states so that the original automaton operates as a periodic background where the additional states serve to define the gliders. Moreover, this study presented an explanation of this method. Furthermore, the random way of defining complex cellular automata was studied by using mean-field approximations for various states and local entropy measures. This specification was refined with a genetic algorithm to obtain specimens with a higher degree of complexity. With this methodology, it was possible to generate complex automata with hundreds of states, demonstrating that randomly defined local interactions with multiple states can construct complexity.
△ Less
Submitted 20 September, 2020;
originally announced September 2020.
-
On complex dynamics from reversible cellular automata
Authors:
Juan Carlos Seck-Tuoh-Mora,
Genaro J. Martinez,
Norberto Hernandez-Romero,
Joselito Medina-Marin,
Irving Barragan-Vite
Abstract:
Complexity has been a recurrent research topic in cellular automata because they represent systems where complex behaviors emerge from simple local interactions. A significant amount of previous research has been conducted proposing instances of complex cellular automata; however, most of the proposed methods are based on a careful search or a meticulous construction of evolution rules.
This pap…
▽ More
Complexity has been a recurrent research topic in cellular automata because they represent systems where complex behaviors emerge from simple local interactions. A significant amount of previous research has been conducted proposing instances of complex cellular automata; however, most of the proposed methods are based on a careful search or a meticulous construction of evolution rules.
This paper presents the emergence of complex behaviors based on reversible cellular automata. In particular, this paper shows that reversible cellular automata represent an adequate framework to obtain complex behaviors adding only new random states.
Experimental results show that complexity can be obtained from reversible cellular automata appending a proportion of about two times more states at random than the original number of states in the reversible automaton. Thus, it is possible to obtain complex cellular automata with dozens of states. Complexity appears to be commonly obtained from reversible cellular automata, and using other operations such as permutations of states or row and column permutations in the evolution rule. The relevance of this paper is to present that reversibility can be a useful structure to implement complex behaviors in cellular automata.
△ Less
Submitted 18 September, 2020;
originally announced September 2020.
-
Jointly Predicting Job Performance, Personality, Cognitive Ability, Affect, and Well-Being
Authors:
Pablo Robles-Granda,
Suwen Lin,
Xian Wu,
Sidney D'Mello,
Gonzalo J. Martinez,
Koustuv Saha,
Kari Nies,
Gloria Mark,
Andrew T. Campbell,
Munmun De Choudhury,
Anind D. Dey,
Julie Gregg,
Ted Grover,
Stephen M. Mattingly,
Shayan Mirjafari,
Edward Moskal,
Aaron Striegel,
Nitesh V. Chawla
Abstract:
Assessment of job performance, personalized health and psychometric measures are domains where data-driven and ubiquitous computing exhibits the potential of a profound impact in the future. Existing techniques use data extracted from questionnaires, sensors (wearable, computer, etc.), or other traits, to assess well-being and cognitive attributes of individuals. However, these techniques can neit…
▽ More
Assessment of job performance, personalized health and psychometric measures are domains where data-driven and ubiquitous computing exhibits the potential of a profound impact in the future. Existing techniques use data extracted from questionnaires, sensors (wearable, computer, etc.), or other traits, to assess well-being and cognitive attributes of individuals. However, these techniques can neither predict individual's well-being and psychological traits in a global manner nor consider the challenges associated to processing the data available, that is incomplete and noisy. In this paper, we create a benchmark for predictive analysis of individuals from a perspective that integrates: physical and physiological behavior, psychological states and traits, and job performance. We design data mining techniques as benchmark and uses real noisy and incomplete data derived from wearable sensors to predict 19 constructs based on 12 standardized well-validated tests. The study included 757 participants who were knowledge workers in organizations across the USA with varied work roles. We developed a data mining framework to extract the meaningful predictors for each of the 19 variables under consideration. Our model is the first benchmark that combines these various instrument-derived variables in a single framework to understand people's behavior by leveraging real uncurated data from wearable, mobile, and social media sources. We verify our approach experimentally using the data obtained from our longitudinal study. The results show that our framework is consistently reliable and capable of predicting the variables under study better than the baselines when prediction is restricted to the noisy, incomplete data.
△ Less
Submitted 10 June, 2020;
originally announced June 2020.
-
RUPER-LB: Load balancing embarrasingly parallel applications in unpredictable cloud environments
Authors:
Vicent Giménez Alventosa,
Germán Moltó Martínez,
J. Damián Segrelles Quilis
Abstract:
The suitability of cloud computing has been studied by several authors to run scientific applications. However, the unpredictable performance fluctuations in these environments hinders the migration of scientific applications to cloud providers. To mitigate these effects, this work presents RUPER-LB, a load balancer for loosely-coupled iterative parallel applications that runs on infrastructures w…
▽ More
The suitability of cloud computing has been studied by several authors to run scientific applications. However, the unpredictable performance fluctuations in these environments hinders the migration of scientific applications to cloud providers. To mitigate these effects, this work presents RUPER-LB, a load balancer for loosely-coupled iterative parallel applications that runs on infrastructures with disparate computing capabilities. The results obtained with a real world simulation software, show the suitability of RUPER-LB to adapt this kind of applications to execution environments with variable performance and highlight the convenience of its adoption.
△ Less
Submitted 25 May, 2020; v1 submitted 13 May, 2020;
originally announced May 2020.
-
On patterns and dynamics of Rule 22 cellular automaton
Authors:
Genaro J. Martinez,
Andrew Adamatzky,
Rolf Hoffmann,
Dominique Deserable,
Ivan Zelinka
Abstract:
Rule 22 elementary cellular automaton (ECA) has a 3--cell neighborhood, binary cell states, where a cell takes state `1' if there is exactly one neighbor, including the cell itself, in state `1'. In Boolean terms the cell-state transition is a XOR function of three cell states. In physico--chemical terms the rule might be seen as describing propagation of self-inhibiting quantities/species. Space-…
▽ More
Rule 22 elementary cellular automaton (ECA) has a 3--cell neighborhood, binary cell states, where a cell takes state `1' if there is exactly one neighbor, including the cell itself, in state `1'. In Boolean terms the cell-state transition is a XOR function of three cell states. In physico--chemical terms the rule might be seen as describing propagation of self-inhibiting quantities/species. Space-time dynamics of Rule 22 demonstrates non-trivial patterns and quasi-chaotic behavior. We characterize the phenomena observed in this rule using mean field theory, attractors, de Bruijn diagrams, subset diagrams, filters, fractals and memory.
△ Less
Submitted 4 May, 2020;
originally announced May 2020.
-
EMAP: A Cloud-Edge Hybrid Framework for EEG Monitoring and Cross-Correlation Based Real-time Anomaly Prediction
Authors:
Bharath Srinivas Prabakaran,
Alberto García Jiménez,
Germán Moltó Martínez,
Muhammad Shafique
Abstract:
State-of-the-art techniques for detecting, or predicting, neurological disorders (1) focus on predicting each disorder individually, and are (2) computationally expensive, leading to a delay that can potentially render the prediction useless, especially in critical events. Towards this, we present a real-time two-tiered framework called EMAP, which cross-correlates the input with all the EEG signa…
▽ More
State-of-the-art techniques for detecting, or predicting, neurological disorders (1) focus on predicting each disorder individually, and are (2) computationally expensive, leading to a delay that can potentially render the prediction useless, especially in critical events. Towards this, we present a real-time two-tiered framework called EMAP, which cross-correlates the input with all the EEG signals in our mega-database (a combination of multiple EEG datasets) at the cloud, while tracking the signal in real-time at the edge, to predict the occurrence of a neurological anomaly. Using the proposed framework, we have demonstrated a prediction accuracy of up to 94% for the three different anomalies that we have tested.
△ Less
Submitted 22 April, 2020;
originally announced April 2020.
-
Computational universality of fungal sandpile automata
Authors:
Eric Goles,
Michail-Antisthenis Tsompanas,
Andrew Adamatzky,
Martin Tegelaar,
Han A. B. Wosten,
Genaro J. Martinez
Abstract:
Hyphae within the mycelia of the ascomycetous fungi are compartmentalised by septa. Each septum has a pore that allows for inter-compartmental and inter-hyphal streaming of cytosol and even organelles. The compartments, however, have special organelles, Woronin bodies, that can plug the pores. When the pores are blocked, no flow of cytoplasm takes place. Inspired by the controllable compartmentali…
▽ More
Hyphae within the mycelia of the ascomycetous fungi are compartmentalised by septa. Each septum has a pore that allows for inter-compartmental and inter-hyphal streaming of cytosol and even organelles. The compartments, however, have special organelles, Woronin bodies, that can plug the pores. When the pores are blocked, no flow of cytoplasm takes place. Inspired by the controllable compartmentalisation within the mycelium of the ascomycetous fungi we designed two-dimensional fungal automata. A fungal automaton is a cellular automaton where communication between neighbouring cells can be blocked on demand. We demonstrate computational universality of the fungal automata by implementing sandpile cellular automata circuits there. We reduce the Monotone Circuit Value Problem to the Fungal Automaton Prediction Problem. We construct families of wires, cross-overs and gates to prove that the fungal automata are P-complete.
△ Less
Submitted 19 March, 2020;
originally announced March 2020.
-
Fungal Automata
Authors:
Andrew Adamatzky,
Eric Goles,
Genaro J. Martinez,
Michail-Antisthenis Tsompanas,
Martin Tegelaar,
Han A. B. Wosten
Abstract:
We study a cellular automaton (CA) model of information dynamics on a single hypha of a fungal mycelium. Such a filament is divided in compartments (here also called cells) by septa. These septa are invaginations of the cell wall and their pores allow for flow of cytoplasm between compartments and hyphae. The septal pores of the fungal phylum of the Ascomycota can be closed by organelles called Wo…
▽ More
We study a cellular automaton (CA) model of information dynamics on a single hypha of a fungal mycelium. Such a filament is divided in compartments (here also called cells) by septa. These septa are invaginations of the cell wall and their pores allow for flow of cytoplasm between compartments and hyphae. The septal pores of the fungal phylum of the Ascomycota can be closed by organelles called Woronin bodies. Septal closure is increased when the septa become older and when exposed to stress conditions. Thus, Woronin bodies act as informational flow valves. The one dimensional fungal automata is a binary state ternary neighbourhood CA, where every compartment follows one of the elementary cellular automata (ECA) rules if its pores are open and either remains in state `0' (first species of fungal automata) or its previous state (second species of fungal automata) if its pores are closed. The Woronin bodies closing the pores are also governed by ECA rules. We analyse a structure of the composition space of cell-state transition and pore-state transitions rules, complexity of fungal automata with just few Woronin bodies, and exemplify several important local events in the automaton dynamics.
△ Less
Submitted 18 March, 2020;
originally announced March 2020.
-
Universal One-Dimensional Cellular Automata Derived for Turing Machines and its Dynamical Behaviour
Authors:
Sergio J. Martinez,
Ivan M. Mendoza,
Genaro J. Martinez,
Shigeru Ninagawa
Abstract:
Universality in cellular automata theory is a central problem studied and developed from their origins by John von Neumann. In this paper, we present an algorithm where any Turing machine can be converted to one-dimensional cellular automaton with a 2-linear time and display its spatial dynamics. Three particular Turing machines are converted in three universal one-dimensional cellular automata, t…
▽ More
Universality in cellular automata theory is a central problem studied and developed from their origins by John von Neumann. In this paper, we present an algorithm where any Turing machine can be converted to one-dimensional cellular automaton with a 2-linear time and display its spatial dynamics. Three particular Turing machines are converted in three universal one-dimensional cellular automata, they are: binary sum, rule 110 and a universal reversible Turing machine.
△ Less
Submitted 6 July, 2019;
originally announced July 2019.
-
Brief Notes and History Computing in Mexico during 50 years
Authors:
Genaro J. Martinez,
Juan C. Seck-Tuoh-Mora,
Sergio V. Chapa-Vergara,
Christian Lemaitre
Abstract:
The history of computing in Mexico can not be thought without the name of Prof. Harold V. McIntosh (1929-2015). For almost 50 years, in Mexico he contributed to the development of computer science with wide international recognition. Approximately in 1964, McIntosh began working in the Physics Department of the Advanced Studies Center (CIEA) of the National Polytechnic Institute (IPN), now called…
▽ More
The history of computing in Mexico can not be thought without the name of Prof. Harold V. McIntosh (1929-2015). For almost 50 years, in Mexico he contributed to the development of computer science with wide international recognition. Approximately in 1964, McIntosh began working in the Physics Department of the Advanced Studies Center (CIEA) of the National Polytechnic Institute (IPN), now called CINVESTAV. In 1965, at the National Center of Calculus (CeNaC), he was a founding member of the Master in Computing, first in Latin America. With the support of Mario Baez Camargo and Enrique Melrose, McIntosh continues his research of Martin-Baltimore Computer Center and University of Florida at IBM 709.
△ Less
Submitted 17 May, 2019;
originally announced May 2019.
-
Dijkstra Monads for All
Authors:
Kenji Maillard,
Danel Ahman,
Robert Atkey,
Guido Martinez,
Catalin Hritcu,
Exequiel Rivas,
Éric Tanter
Abstract:
This paper proposes a general semantic framework for verifying programs with arbitrary monadic side-effects using Dijkstra monads, which we define as monad-like structures indexed by a specification monad. We prove that any monad morphism between a computational monad and a specification monad gives rise to a Dijkstra monad, which provides great flexibility for obtaining Dijkstra monads tailored t…
▽ More
This paper proposes a general semantic framework for verifying programs with arbitrary monadic side-effects using Dijkstra monads, which we define as monad-like structures indexed by a specification monad. We prove that any monad morphism between a computational monad and a specification monad gives rise to a Dijkstra monad, which provides great flexibility for obtaining Dijkstra monads tailored to the verification task at hand. We moreover show that a large variety of specification monads can be obtained by applying monad transformers to various base specification monads, including predicate transformers and Hoare-style pre- and postconditions. For defining correct monad transformers, we propose a language inspired by Moggi's monadic metalanguage that is parameterized by a dependent type theory. We also develop a notion of algebraic operations for Dijkstra monads, and start to investigate two ways of also accommodating effect handlers. We implement our framework in both Coq and F*, and illustrate that it supports a wide variety of verification styles for effects such as exceptions, nondeterminism, state, input-output, and general recursion.
△ Less
Submitted 26 June, 2019; v1 submitted 4 March, 2019;
originally announced March 2019.
-
Meta-F*: Proof Automation with SMT, Tactics, and Metaprograms
Authors:
Guido Martínez,
Danel Ahman,
Victor Dumitrescu,
Nick Giannarakis,
Chris Hawblitzel,
Catalin Hritcu,
Monal Narasimhamurthy,
Zoe Paraskevopoulou,
Clément Pit-Claudel,
Jonathan Protzenko,
Tahina Ramananandro,
Aseem Rastogi,
Nikhil Swamy
Abstract:
We introduce Meta-F*, a tactics and metaprogramming framework for the F* program verifier. The main novelty of Meta-F* is allowing the use of tactics and metaprogramming to discharge assertions not solvable by SMT, or to just simplify them into well-behaved SMT fragments. Plus, Meta-F* can be used to generate verified code automatically.
Meta-F* is implemented as an F* effect, which, given the p…
▽ More
We introduce Meta-F*, a tactics and metaprogramming framework for the F* program verifier. The main novelty of Meta-F* is allowing the use of tactics and metaprogramming to discharge assertions not solvable by SMT, or to just simplify them into well-behaved SMT fragments. Plus, Meta-F* can be used to generate verified code automatically.
Meta-F* is implemented as an F* effect, which, given the powerful effect system of F*, heavily increases code reuse and even enables the lightweight verification of metaprograms. Metaprograms can be either interpreted, or compiled to efficient native code that can be dynamically loaded into the F* type-checker and can interoperate with interpreted code. Evaluation on realistic case studies shows that Meta-F* provides substantial gains in proof development, efficiency, and robustness.
△ Less
Submitted 7 March, 2019; v1 submitted 17 March, 2018;
originally announced March 2018.
-
Logical Gates via Gliders Collisions
Authors:
Genaro J. Martinez,
Andrew Adamatzky,
Kenichi Morita
Abstract:
An elementary cellular automaton with memory is a chain of finite state machines (cells) updating their state simultaneously and by the same rule. Each cell updates its current state depending on current states of its immediate neighbours and a certain number of its own past states. Some cell-state transition rules support gliders, compact patterns of non-quiescent states translating along the cha…
▽ More
An elementary cellular automaton with memory is a chain of finite state machines (cells) updating their state simultaneously and by the same rule. Each cell updates its current state depending on current states of its immediate neighbours and a certain number of its own past states. Some cell-state transition rules support gliders, compact patterns of non-quiescent states translating along the chain. We present designs of logical gates, including reversible Fredkin gate and controlled NOT gate, implemented via collisions between gliders.
△ Less
Submitted 14 March, 2018;
originally announced March 2018.
-
A group law on the projective plane with applications in Public Key Cryptography
Authors:
R. Durán Díaz,
V. Gayoso Martínez,
L. Hernández Encinas,
J. Muñoz Masqué
Abstract:
We present a new group law defined on a subset of the projective plane $\mathbb{F}P^2$ over an arbitrary field $\mathbb{F}$, which lends itself to applications in Public Key Cryptography, in particular to a Diffie-Hellman-like key agreement protocol. We analyze the computational difficulty of solving the mathematical problem underlying the proposed Abelian group law and we prove that the security…
▽ More
We present a new group law defined on a subset of the projective plane $\mathbb{F}P^2$ over an arbitrary field $\mathbb{F}$, which lends itself to applications in Public Key Cryptography, in particular to a Diffie-Hellman-like key agreement protocol. We analyze the computational difficulty of solving the mathematical problem underlying the proposed Abelian group law and we prove that the security of our proposal is equivalent to the discrete logarithm problem in the multiplicative group of the cubic extension of the finite field considered. Finally, we present a variant of the proposed group law but over the ring $\mathbb{Z}/pq\mathbb{Z}$, and explain how the security becomes enhanced, though at the cost of a longer key length.
△ Less
Submitted 10 June, 2019; v1 submitted 1 February, 2018;
originally announced February 2018.
-
Confluence in Probabilistic Rewriting
Authors:
Alejandro Díaz-Caro,
Guido Martínez
Abstract:
Driven by the interest of reasoning about probabilistic programming languages, we set out to study a notion of unicity of normal forms for them. To provide a tractable proof method for it, we define a property of distribution confluence which is shown to imply the desired uniqueness (even for infinite sequences of reduction) and further properties. We then carry over several criteria from the clas…
▽ More
Driven by the interest of reasoning about probabilistic programming languages, we set out to study a notion of unicity of normal forms for them. To provide a tractable proof method for it, we define a property of distribution confluence which is shown to imply the desired uniqueness (even for infinite sequences of reduction) and further properties. We then carry over several criteria from the classical case, such as Newman's lemma, to simplify proving confluence in concrete languages. Using these criteria, we obtain simple proofs of confluence for $λ_1$, an affine probabilistic $λ$-calculus, and for Q$^*$, a quantum programming language for which a related property has already been proven in the literature.
△ Less
Submitted 30 April, 2018; v1 submitted 11 August, 2017;
originally announced August 2017.
-
Low-complexity Distributed Tomographic Backprojection for large datasets
Authors:
Gilberto Martinez Jr.,
Janito V. Ferreira Filho,
Eduardo X. Miqueles
Abstract:
In this manuscript we present a fast GPU implementation for tomographic reconstruction of large datasets using data obtained at the Brazilian synchrotron light source. The algorithm is distributed in a cluster with 4 GPUs through a fast pipeline implemented in C programming language. Our algorithm is theoretically based on a recently discovered low complexity formula, computing the total volume wi…
▽ More
In this manuscript we present a fast GPU implementation for tomographic reconstruction of large datasets using data obtained at the Brazilian synchrotron light source. The algorithm is distributed in a cluster with 4 GPUs through a fast pipeline implemented in C programming language. Our algorithm is theoretically based on a recently discovered low complexity formula, computing the total volume within O(N3logN) floating point operations; much less than traditional algorithms that operates with O(N4) flops over an input data of size O(N3). The results obtained with real data indicate that a reconstruction can be achieved within 1 second provided the data is transferred completely to the memory.
△ Less
Submitted 26 April, 2017;
originally announced April 2017.
-
On plant roots logical gates
Authors:
Andrew Adamatzky,
Georgios Sirakoulis,
Genaro J. Martinez,
Frantisek Baluska,
Stefano Mancuso
Abstract:
Theoretical constructs of logical gates implemented with plant roots are morphological computing asynchronous devices. Values of Boolean variables are represented by plant roots. A presence of a plant root at a given site symbolises the logical {\sc True}, an absence the logical {\sc False}. Logical functions are calculated via interaction between roots. Two types of two-inputs-two-outputs gates a…
▽ More
Theoretical constructs of logical gates implemented with plant roots are morphological computing asynchronous devices. Values of Boolean variables are represented by plant roots. A presence of a plant root at a given site symbolises the logical {\sc True}, an absence the logical {\sc False}. Logical functions are calculated via interaction between roots. Two types of two-inputs-two-outputs gates are proposed: a gate $\langle x, y \rangle \rightarrow \langle xy, x+y \rangle$ where root apexes are guided by gravity and a gate $\langle x, y \rangle \rightarrow \langle \overline{x}y, x \rangle$ where root apexes are guided by humidity. We propose a design of binary half-adder based on the gates.
△ Less
Submitted 14 October, 2016;
originally announced October 2016.
-
A Computation in a Cellular Automaton Collider Rule 110
Authors:
Genaro J. Martinez,
Andrew Adamatzky,
Harold V. McIntosh
Abstract:
A cellular automaton collider is a finite state machine build of rings of one-dimensional cellular automata. We show how a computation can be performed on the collider by exploiting interactions between gliders (particles, localisations). The constructions proposed are based on universality of elementary cellular automaton rule 110, cyclic tag systems, supercolliders, and computing on rings.
A cellular automaton collider is a finite state machine build of rings of one-dimensional cellular automata. We show how a computation can be performed on the collider by exploiting interactions between gliders (particles, localisations). The constructions proposed are based on universality of elementary cellular automaton rule 110, cyclic tag systems, supercolliders, and computing on rings.
△ Less
Submitted 16 September, 2016;
originally announced September 2016.
-
Dijkstra Monads for Free
Authors:
Danel Ahman,
Catalin Hritcu,
Kenji Maillard,
Guido Martinez,
Gordon Plotkin,
Jonathan Protzenko,
Aseem Rastogi,
Nikhil Swamy
Abstract:
Dijkstra monads enable a dependent type theory to be enhanced with support for specifying and verifying effectful code via weakest preconditions. Together with their closely related counterparts, Hoare monads, they provide the basis on which verification tools like F*, Hoare Type Theory (HTT), and Ynot are built.
We show that Dijkstra monads can be derived "for free" by applying a continuation-p…
▽ More
Dijkstra monads enable a dependent type theory to be enhanced with support for specifying and verifying effectful code via weakest preconditions. Together with their closely related counterparts, Hoare monads, they provide the basis on which verification tools like F*, Hoare Type Theory (HTT), and Ynot are built.
We show that Dijkstra monads can be derived "for free" by applying a continuation-passing style (CPS) translation to the standard monadic definitions of the underlying computational effects. Automatically deriving Dijkstra monads in this way provides a correct-by-construction and efficient way of reasoning about user-defined effects in dependent type theories.
We demonstrate these ideas in EMF*, a new dependently typed calculus, validating it via both formal proof and a prototype implementation within F*. Besides equipping F* with a more uniform and extensible effect system, EMF* enables a novel mixture of intrinsic and extrinsic proofs within F*.
△ Less
Submitted 12 October, 2019; v1 submitted 23 August, 2016;
originally announced August 2016.
-
Logic gates and complex dynamics in a hexagonal cellular automaton: the Spiral rule
Authors:
Rogelio Basurto,
Paulina A. León,
Genaro J. Martínez,
Juan C. Seck-Tuoh-Mora
Abstract:
In previous works, hexagonal cellular automata (CA) have been studied as a variation of the famous Game of Life CA, mainly for spiral phenomena simulations; where the most interesting constructions are related to the Belousov-Zhabotinsky reaction. In this paper, we analyse a special kind of hexagonal CA, {\it Spiral rule}. Such automaton shows a non-trivial complex behaviour related to discrete mo…
▽ More
In previous works, hexagonal cellular automata (CA) have been studied as a variation of the famous Game of Life CA, mainly for spiral phenomena simulations; where the most interesting constructions are related to the Belousov-Zhabotinsky reaction. In this paper, we analyse a special kind of hexagonal CA, {\it Spiral rule}. Such automaton shows a non-trivial complex behaviour related to discrete models of reaction-diffusion chemical media, dominated by spiral guns which easily emerge from random initial conditions. The computing capabilities of this automaton are shown by means of logic gates. These are defined by collisions between mobile localizations. Also, an extended classification of complex self-localisation patterns is presented, including some self-organised patterns.
△ Less
Submitted 4 November, 2014;
originally announced November 2014.
-
Jabalin: a Comprehensive Computational Model of Modern Standard Arabic Verbal Morphology Based on Traditional Arabic Prosody
Authors:
Alicia Gonzalez Martinez,
Susana Lopez Hervas,
Doaa Samy,
Carlos G. Arques,
Antonio Moreno Sandoval
Abstract:
The computational handling of Modern Standard Arabic is a challenge in the field of natural language processing due to its highly rich morphology. However, several authors have pointed out that the Arabic morphological system is in fact extremely regular. The existing Arabic morphological analyzers have exploited this regularity to variable extent, yet we believe there is still some scope for impr…
▽ More
The computational handling of Modern Standard Arabic is a challenge in the field of natural language processing due to its highly rich morphology. However, several authors have pointed out that the Arabic morphological system is in fact extremely regular. The existing Arabic morphological analyzers have exploited this regularity to variable extent, yet we believe there is still some scope for improvement. Taking inspiration in traditional Arabic prosody, we have designed and implemented a compact and simple morphological system which in our opinion takes further advantage of the regularities encountered in the Arabic morphological system. The output of the system is a large-scale lexicon of inflected forms that has subsequently been used to create an Online Interface for a morphological analyzer of Arabic verbs. The Jabalin Online Interface is available at http://elvira.lllf.uam.es/jabalin/, hosted at the LLI-UAM lab. The generation system is also available under a GNU GPL 3 license.
△ Less
Submitted 29 June, 2014;
originally announced June 2014.