To Block or Not to Block Accelerating Mobile Web Pages On The Fly Through JavaScript Classification

The increasing complexity of JavaScript in modern mobile web pages has become a critical performance bottleneck for low-end mobile phone users, especially indeveloping regions . SlimWeb aims to improve the web browsing experience by predicting the class of eachelement, such that essential elements are preserved and non-essential elements are blocked by the browsers using the service .…

To Block or Not to Block Accelerating Mobile Web Pages On The Fly Through JavaScript Classification

The increasing complexity of JavaScript in modern mobile web pages has become a critical performance bottleneck for low-end mobile phone users, especially indeveloping regions . SlimWeb aims to improve the web browsing experience by predicting the class of eachelement, such that essential elements are preserved and non-essential elements are blocked by the browsers using the service .…

MIMHD Accurate and Efficient Hyperdimensional Inference Using Multi Bit In Memory Computing

Hyperdimensional Computing (HDC) is an emerging computational framework that mimics important brain functions by operating over high-dimensional vectors . In-memory computing implementations of HDC are desirable since they can significantly reduce data transfer overheads . MIMHD using 3-bit (2-bit)precision HVs achieves (i) average accuracy of 92.6% (88.9%) which is 8.5%(4.8%) higher than binary implementations; (ii) 84.1x (78.6x) energyimprovement over a GPU, and (iii) 38.4x (34.3x) speedup over a .…

Energy Efficient In memory Hyperdimensional Encoding for Spatio temporal Signal Processing

The emerging brain-inspired computing paradigm known as hyperdimensionalcomputing (HDC) has been proven to provide a lightweight learning framework for various cognitive tasks . Spatio-temporal (ST) signal processing, which encompassesbiosignals such as electromyography (EMG) and electroencephalography, is one family of applications that could benefit from an HDC-based learningframework .…

DetectX Adversarial Input Detection using Current Signatures in Memristive XBar Arrays

DetectX is 10x-25x more energy efficient and immune to dynamic adversarial attacks compared to previous state-of-the-art works . We achieve high detection performance(ROC-AUC 0.95) for strong white-box and black-box attacks . The code has been released at https://://://github.com/Intelligent-Computing-Lab-Yale/DetectX . We show that adversarial inputshave higher SoI compared to clean inputs.…

Fully CMOS compatible passive TiO2 based memristor crossbars for in memory computing

Brain-inspired computing and neuromorphic hardware offer great potential to overcome limitations faced by current computing paradigms based on von-Neumann architecture . Memristor crossbar arrays can natively perform in-memory computing and fundamental synapticoperations required for neural network implementation . We show successful bottom electrode fabrication by a damascene process, resulting in an optimised topography and surfaceroughness as low as 1.1 nm .…

Generalized Square roots of Not matrices their application to the unveiling of hidden logical operators and to the definition of fully matrix circular Euler functions

The square root of Not is a logical operator of importance in quantum computing theory and of interest as a mathematical object in its own right . Inphysics, it is a square complex matrix of dimension 2 . The introduction of linearalgebra into logical theory has been enhanced in recent decades by theresearches in the field of neural networks and quantum computing .…

HIFIR Hybrid Incomplete Factorization with Iterative Refinement for Preconditioning Ill conditioned and Singular Systems

HIFIR computes a hybrid incomplete factorization, which combines multilevel incomplete LUfactorization with a truncated, rank-revealing QR factorization on the finalSchur complement . This novel hybridization is based on the new theory ofapproximate generalized inverse and $\epsilon$-accuracy . It enablesnear-optimal preconditioners for consistent systems and enables flexible GMRESto solve inconsistent systems when coupled with iterative refinement .…

Reasoning about Emergence of Collective Memory

Agents keepignalling within neighbourhoods, and depending on how many support each signal, some signals “win” in that neighbourhood . By agents interacting betweendifferent neighbourhoods, ‘influence’ spreads and sometimes, a collectivesignal emerges . We propose a logic in which we can reason about such emergence of memory .…

Consideration of the Need for Quantum Grid Computing

Quantum computers can solve complex problems that are beyond the ability of even advanced future classical-style computers . Quantum computers have demonstrated a capability to solve some problems (such as prime factoring) much more efficiently than classical computing . This will create problems for encryption techniques, which depend on the difficulty of factoring for their security .…

Posets with Interfaces for Concurrent Kleene Algebra

In partial ordersemantics of concurrency, this amounts to designate events that continue theirexecution across components . Alternatively, in terms of decomposing concurrentsystems, it allows cutting through some events, whereas serial composition maycut through edges only . We show that iposets under gluing composition form a category, extending themonoid of posets under serial composition, and a 2-category when enriched with subsumption order and a suitable parallel composition as a lax tensor .…

On predicting research grants productivity

Understanding the reasons associated with successful proposals is ofparamount importance to improve evaluation processes . We found that researchsubject and publication history play a role in predicting productivity . Institution-based features turned out to be relevant when combined with other features .…

Identifying intracity freight trip ends from heavy truck GPS trajectories

In the big data era, massive heavy truck GPStrajectories can be acquired cost effectively in real-time . Intracity heavy truck freight trips are basic data in city freight system planning and management . We propose a data-driven trip end identification method in which the speed threshold for identifying truck stops and themultilevel time thresholds for distinguishing temporary stops and freight tripends are defined .…

Identifying intracity freight trip ends from heavy truck GPS trajectories

In the big data era, massive heavy truck GPStrajectories can be acquired cost effectively in real-time . Intracity heavy truck freight trips are basic data in city freight system planning and management . We propose a data-driven trip end identification method in which the speed threshold for identifying truck stops and themultilevel time thresholds for distinguishing temporary stops and freight tripends are defined .…

A Fuzzy Post project Evaluation Approach for Security Video Surveillance System

Post-project evaluation can scientifically and objectively evaluate the construction effectiveness of video surveillancesystem at a certain stage . Video surveillance is an essential component of the public security system . The fuzzy theory and fuzzy multi-levelevaluation method are applied . The evaluation result demonstrates that the proposed approach is practically applicable to real-world security videosurveillance systems in a real world community .…

A Fuzzy Post project Evaluation Approach for Security Video Surveillance System

Post-project evaluation can scientifically and objectively evaluate the construction effectiveness of video surveillancesystem at a certain stage . Video surveillance is an essential component of the public security system . The fuzzy theory and fuzzy multi-levelevaluation method are applied . The evaluation result demonstrates that the proposed approach is practically applicable to real-world security videosurveillance systems in a real world community .…

Quantum algorithm for Dyck Language with Multiple Types of Brackets

We consider the recognition problem of the Dyck Language generalized formultiple types of brackets . We provide an algorithm with quantum querycomplexity $O(\sqrt{n}(\log n)^{0.5k$ for some constant $c$ We show the lowerbound for this problem which is $O(O(n)c^{k)$ for $O (n) c) for $c) We also show that quantum algorithms for solving this problem are of similar nature and requirements .…

Momentum inspired Low Rank Coordinate Descent for Diagonally Constrained SDPs

We present a novel, practical, and provable approach for solving diagonallyconstrained semi-definite programming (SDP) problems at scale using acceleratednon-convex programming . Our algorithm non-trivially combines accelerationmotions from convex optimization with coordinate power iteration and matrixfactorization techniques . The algorithm is extremely simple to implement, and only a single extra hyperparameter — momentum .…

The Connection between Process Complexity of Event Sequences and Models discovered by Process Mining

Process mining is a research area focusing on the design of algorithms that can automatically provide insights into business processes by analysing historic process execution data . Among the most popularalgorithms are those for automated process discovery, whose ultimate goal is togenerate the best process model that summarizes the behaviour recorded in the input event log .…

Automatic winning shifts

To each one-dimensional subshift $X$ we may associate a winning shift $W(X)$ which arises from a combinatorial game played on the language of $X$. In this paper, we develop a notion ofautomaticity for the finite automaton . We prove that as long as there is a bound on the number of nonzerosymbols in configurations of $W, $W is accepted by a finite automata .…

Minimality Notions via Factorization Systems

For the minimization of state-based systems, there are two obvious aspects: removing unnecessary states of the system and merging redundant states . In the present article, we relate the two aspects on coalgebras by defining an abstract notion of minimality using factorization systems .…

IoT Solution for Winter Survival of Indoor Plants

People often treat indoor plants as mere decoration, which can often lead to health issues for the plant oreven death of the plant, especially during winter . A plant monitoring system was developed to solve this problem, collecting information on plants’ conditions (light, humidity, and temperature) and providing this information in an accessible format for the user .…

IoT Solution for Winter Survival of Indoor Plants

People often treat indoor plants as mere decoration, which can often lead to health issues for the plant oreven death of the plant, especially during winter . A plant monitoring system was developed to solve this problem, collecting information on plants’ conditions (light, humidity, and temperature) and providing this information in an accessible format for the user .…

Minimization and Canonization of GFG Transition Based Automata

We describe a polynomial minimization algorithm for GFGco-B\”uchi word automata with transition-based acceptance . The minimization problem for deterministic B\”uchi and co-B \”uchi words is NP-complete . The algorithm is based on a sequence of transformations weapply to the automaton, on top of which a minimal quotient automaton is defined .…

Matching Patterns with Variables under Hamming Distance

A pattern $\alpha$ is a string of variables and terminal letters . We say that $\alpha$ matches a word $w$, consisting only of terminal letters, if $w$ can beobtained by replacing the variables of $alpha$ by terminal words . We show that the problem can still be solved efficiently if we allow repeated variables, but restrict the way the different variables can beinterleaved according to a locality parameter .…

Femto Containers DevOps on Microcontrollers with Lightweight Virtualization Isolation for IoT Software Modules

The Internet of Things (IoT) connects low-power, microcontroller-based devices which take part in larger distributedcyberphysical systems . Femto-Containers can virtualize and isolate multiple software modules executed concurrently, with very small memory footprint overhead (below 10%) and very small startup time (tens of microseconds) Compared to prior work on software-based virtualization and isolation, femto-containers offer an attractive trade-off in terms of memory footprint, energy consumption, and security .…

PAIO A Software Defined Storage Data Plane Framework

PAIO is the first general-purpose framework that enables system designers to build custom-made Software-Defined Storage (SDS) data planestages . It provides the means to implement storage optimization adaptable to workflows and user-defined policies . PAIO allows stages to beintegrated with modern SDS control planes to ensure holistic control and system-wide optimal performance .…

Femto Containers DevOps on Microcontrollers with Lightweight Virtualization Isolation for IoT Software Modules

The Internet of Things (IoT) connects low-power, microcontroller-based devices which take part in larger distributedcyberphysical systems . Femto-Containers can virtualize and isolate multiple software modules executed concurrently, with very small memory footprint overhead (below 10%) and very small startup time (tens of microseconds) Compared to prior work on software-based virtualization and isolation, femto-containers offer an attractive trade-off in terms of memory footprint, energy consumption, and security .…

PAIO A Software Defined Storage Data Plane Framework

PAIO is the first general-purpose framework that enables system designers to build custom-made Software-Defined Storage (SDS) data planestages . It provides the means to implement storage optimization adaptable to workflows and user-defined policies . PAIO allows stages to beintegrated with modern SDS control planes to ensure holistic control and system-wide optimal performance .…

GearV A Two Gear Hypervisor for Mixed Criticality IoT Systems

This paper presents GearV, a two-gear lightweight hypervisor architecture to address the some known challenges . By dividing hypervisor into some partitions, dividing scheduling policies into Gear1 and Gear2 respectively, GearVcreates a consolidated platform to run best-effort system and safety-critical system simultaneously .…

On groups presented by inverse closed finite convergent length reducing rewriting systems

We show that groups presented by inverse-closed finite convergent length-reducing rewriting systems are characterised by a striking geometric property . Cayley graphs are geodetic and side-lengths of non-degeneratetriangles are uniformly bounded . This leads to a new algebraic result: thegroup is plain (isomorphic to the free product of finitely many finite groups) if and only if a certain relation on the set ofnon-trivial finite-order elements of the group is transitive on a bounded set .…

Free Choice Nets With Home Clusters Are Lucent

A marked Petri net is lucent if there are no two different reachable markings enabling the same set of transitions . These nets have a so-called home marking such that it is always possible to reach this marking again . Sucha home marking can serve as a regeneration point or as an end-point .…

GearV A Two Gear Hypervisor for Mixed Criticality IoT Systems

This paper presents GearV, a two-gear lightweight hypervisor architecture to address the some known challenges . By dividing hypervisor into some partitions, dividing scheduling policies into Gear1 and Gear2 respectively, GearVcreates a consolidated platform to run best-effort system and safety-critical system simultaneously .…

Verification in the Loop Correct by Construction Control Learning with Reach avoid Guarantees

In the current control design of safety-critical autonomous systems, formalverification techniques are typically applied after the controller is designed to evaluate whether the required properties (e.g., safety) are satisfied . However, due to the increasing system complexity and the fundamental hardnessof designing a controller with formal guarantees, such an open-loop process ofdesign-then-verify often results in many iterations and fails to provide thenecessary guarantees .…