## To Block or Not to Block Accelerating Mobile Web Pages On The Fly Through JavaScript Classification

The increasing complexity of JavaScript in modern mobile web pages has become a critical performance bottleneck for low-end mobile phone users, especially indeveloping regions . SlimWeb aims to improve the web browsing experience by predicting the class of eachelement, such that essential elements are preserved and non-essential elements are blocked by the browsers using the service .…

## To Block or Not to Block Accelerating Mobile Web Pages On The Fly Through JavaScript Classification

The increasing complexity of JavaScript in modern mobile web pages has become a critical performance bottleneck for low-end mobile phone users, especially indeveloping regions . SlimWeb aims to improve the web browsing experience by predicting the class of eachelement, such that essential elements are preserved and non-essential elements are blocked by the browsers using the service .…

## MIMHD Accurate and Efficient Hyperdimensional Inference Using Multi Bit In Memory Computing

Hyperdimensional Computing (HDC) is an emerging computational framework that mimics important brain functions by operating over high-dimensional vectors . In-memory computing implementations of HDC are desirable since they can significantly reduce data transfer overheads . MIMHD using 3-bit (2-bit)precision HVs achieves (i) average accuracy of 92.6% (88.9%) which is 8.5%(4.8%) higher than binary implementations; (ii) 84.1x (78.6x) energyimprovement over a GPU, and (iii) 38.4x (34.3x) speedup over a .…

## Energy Efficient In memory Hyperdimensional Encoding for Spatio temporal Signal Processing

The emerging brain-inspired computing paradigm known as hyperdimensionalcomputing (HDC) has been proven to provide a lightweight learning framework for various cognitive tasks . Spatio-temporal (ST) signal processing, which encompassesbiosignals such as electromyography (EMG) and electroencephalography, is one family of applications that could benefit from an HDC-based learningframework .…

## DetectX Adversarial Input Detection using Current Signatures in Memristive XBar Arrays

DetectX is 10x-25x more energy efficient and immune to dynamic adversarial attacks compared to previous state-of-the-art works . We achieve high detection performance(ROC-AUC 0.95) for strong white-box and black-box attacks . The code has been released at https://://://github.com/Intelligent-Computing-Lab-Yale/DetectX . We show that adversarial inputshave higher SoI compared to clean inputs.…

## Fully CMOS compatible passive TiO2 based memristor crossbars for in memory computing

Brain-inspired computing and neuromorphic hardware offer great potential to overcome limitations faced by current computing paradigms based on von-Neumann architecture . Memristor crossbar arrays can natively perform in-memory computing and fundamental synapticoperations required for neural network implementation . We show successful bottom electrode fabrication by a damascene process, resulting in an optimised topography and surfaceroughness as low as 1.1 nm .…

## Generalized Square roots of Not matrices their application to the unveiling of hidden logical operators and to the definition of fully matrix circular Euler functions

The square root of Not is a logical operator of importance in quantum computing theory and of interest as a mathematical object in its own right . Inphysics, it is a square complex matrix of dimension 2 . The introduction of linearalgebra into logical theory has been enhanced in recent decades by theresearches in the field of neural networks and quantum computing .…

## HIFIR Hybrid Incomplete Factorization with Iterative Refinement for Preconditioning Ill conditioned and Singular Systems

HIFIR computes a hybrid incomplete factorization, which combines multilevel incomplete LUfactorization with a truncated, rank-revealing QR factorization on the finalSchur complement . This novel hybridization is based on the new theory ofapproximate generalized inverse and $\epsilon$-accuracy . It enablesnear-optimal preconditioners for consistent systems and enables flexible GMRESto solve inconsistent systems when coupled with iterative refinement .…

## Reasoning about Emergence of Collective Memory

Agents keepignalling within neighbourhoods, and depending on how many support each signal, some signals “win” in that neighbourhood . By agents interacting betweendifferent neighbourhoods, ‘influence’ spreads and sometimes, a collectivesignal emerges . We propose a logic in which we can reason about such emergence of memory .…

## Connectivity of spaces of directed paths in geometric models for concurrent computation

Higher Dimensional Automata (HDA) are higher dimensional relatives totransition systems in concurrency theory . Mathematically, they take the form of labelled cubicalcomplexes . It is important to know whether the space of directed paths between two vertices (states) is connected; moregenerally, to estimate higher connectedness of these path spaces .…

## Consideration of the Need for Quantum Grid Computing

Quantum computers can solve complex problems that are beyond the ability of even advanced future classical-style computers . Quantum computers have demonstrated a capability to solve some problems (such as prime factoring) much more efficiently than classical computing . This will create problems for encryption techniques, which depend on the difficulty of factoring for their security .…

## Posets with Interfaces for Concurrent Kleene Algebra

In partial ordersemantics of concurrency, this amounts to designate events that continue theirexecution across components . Alternatively, in terms of decomposing concurrentsystems, it allows cutting through some events, whereas serial composition maycut through edges only . We show that iposets under gluing composition form a category, extending themonoid of posets under serial composition, and a 2-category when enriched with subsumption order and a suitable parallel composition as a lax tensor .…

## Game theory and scholarly publishing premises for an agreement around open access

Actors in research and scientific publishing are gradually joining theOpen-Access (OA) movement . The rise of OA generates profound changes in the chain of production and dissemination of knowledge . The classic model, based on journal subscriptions is giving way to new economic models that have appeared with the arrivalof OA .…

## On predicting research grants productivity

Understanding the reasons associated with successful proposals is ofparamount importance to improve evaluation processes . We found that researchsubject and publication history play a role in predicting productivity . Institution-based features turned out to be relevant when combined with other features .…

## Identifying intracity freight trip ends from heavy truck GPS trajectories

In the big data era, massive heavy truck GPStrajectories can be acquired cost effectively in real-time . Intracity heavy truck freight trips are basic data in city freight system planning and management . We propose a data-driven trip end identification method in which the speed threshold for identifying truck stops and themultilevel time thresholds for distinguishing temporary stops and freight tripends are defined .…

## Identifying intracity freight trip ends from heavy truck GPS trajectories

In the big data era, massive heavy truck GPStrajectories can be acquired cost effectively in real-time . Intracity heavy truck freight trips are basic data in city freight system planning and management . We propose a data-driven trip end identification method in which the speed threshold for identifying truck stops and themultilevel time thresholds for distinguishing temporary stops and freight tripends are defined .…

## Checking whether a word is Hamming isometric in linear time

A finite word $f$ is Hamming-isometric if for any two word $u$ and $v$ of same length avoiding $f$, $u$, can be transformed into $v$. A linear-time algorithm to check whether a word over a four-letter alphabet of size four is Lee-isometracy .…

## Manifolds jl An Extensible Julia Framework for Data Analysis on Manifolds

Julia package Manifolds.jl provides a fast and easy to use library of Riemannian manifolds and Liegroups . It outperforms existing packages in Matlab or Python by several orders of magnitude . It is about twice as fast as a comparable package in C++ in Cappelimimplemented in Cppelim .…

## A Fuzzy Post project Evaluation Approach for Security Video Surveillance System

Post-project evaluation can scientifically and objectively evaluate the construction effectiveness of video surveillancesystem at a certain stage . Video surveillance is an essential component of the public security system . The fuzzy theory and fuzzy multi-levelevaluation method are applied . The evaluation result demonstrates that the proposed approach is practically applicable to real-world security videosurveillance systems in a real world community .…

## A Fuzzy Post project Evaluation Approach for Security Video Surveillance System

Post-project evaluation can scientifically and objectively evaluate the construction effectiveness of video surveillancesystem at a certain stage . Video surveillance is an essential component of the public security system . The fuzzy theory and fuzzy multi-levelevaluation method are applied . The evaluation result demonstrates that the proposed approach is practically applicable to real-world security videosurveillance systems in a real world community .…

## Quantum algorithm for Dyck Language with Multiple Types of Brackets

We consider the recognition problem of the Dyck Language generalized formultiple types of brackets . We provide an algorithm with quantum querycomplexity $O(\sqrt{n}(\log n)^{0.5k$ for some constant $c$ We show the lowerbound for this problem which is $O(O(n)c^{k)$ for $O (n) c) for$c) We also show that quantum algorithms for solving this problem are of similar nature and requirements .…

## semopy 2 A Structural Equation Modeling Package with Random Effects in Python

Structural Equation Modeling (SEM) is an umbrella term that includes numerousmultivariate statistical techniques that are employed throughout a plethora of research areas . SEM software was either commercial or restricted to niche languages, and the lackof SEM packages compatible with more mainstream programming languages was dire .…

## Momentum inspired Low Rank Coordinate Descent for Diagonally Constrained SDPs

We present a novel, practical, and provable approach for solving diagonallyconstrained semi-definite programming (SDP) problems at scale using acceleratednon-convex programming . Our algorithm non-trivially combines accelerationmotions from convex optimization with coordinate power iteration and matrixfactorization techniques . The algorithm is extremely simple to implement, and only a single extra hyperparameter — momentum .…

## The Connection between Process Complexity of Event Sequences and Models discovered by Process Mining

Process mining is a research area focusing on the design of algorithms that can automatically provide insights into business processes by analysing historic process execution data . Among the most popularalgorithms are those for automated process discovery, whose ultimate goal is togenerate the best process model that summarizes the behaviour recorded in the input event log .…

## On Star Expressions and Coalgebraic Completeness Theorems

An open problem posed by Milner asks for a proof that a certainaxiomatisation, which Milner showed is sound with respect to bisimilarity for regular expressions, is also complete . In this paper, we analyse Grabmayer and Fokkink’s proof of completeness from the perspective of universalcoalgebra .…

## Automatic winning shifts

To each one-dimensional subshift $X$ we may associate a winning shift $W(X)$ which arises from a combinatorial game played on the language of $X$. In this paper, we develop a notion ofautomaticity for the finite automaton . We prove that as long as there is a bound on the number of nonzerosymbols in configurations of $W,$W is accepted by a finite automata .…

## Hip to Be Latin Square Maximal Period Sequences from Orthogonal Cellular Automata

Orthogonal Cellular Automata (OCA) have been investigated in the literature as a new approach to construct orthogonal Latin squares forcryptographic applications such as secret sharing schemes . The main advantage is that OCA ensure a certain amount of diffusion inthe generated sequences, a property which is usually missing from traditionalCA-based pseudorandom number generators .…

## Minimality Notions via Factorization Systems

For the minimization of state-based systems, there are two obvious aspects: removing unnecessary states of the system and merging redundant states . In the present article, we relate the two aspects on coalgebras by defining an abstract notion of minimality using factorization systems .…

## IoT Solution for Winter Survival of Indoor Plants

People often treat indoor plants as mere decoration, which can often lead to health issues for the plant oreven death of the plant, especially during winter . A plant monitoring system was developed to solve this problem, collecting information on plants’ conditions (light, humidity, and temperature) and providing this information in an accessible format for the user .…

## IoT Solution for Winter Survival of Indoor Plants

People often treat indoor plants as mere decoration, which can often lead to health issues for the plant oreven death of the plant, especially during winter . A plant monitoring system was developed to solve this problem, collecting information on plants’ conditions (light, humidity, and temperature) and providing this information in an accessible format for the user .…

## Minimization and Canonization of GFG Transition Based Automata

We describe a polynomial minimization algorithm for GFGco-B\”uchi word automata with transition-based acceptance . The minimization problem for deterministic B\”uchi and co-B \”uchi words is NP-complete . The algorithm is based on a sequence of transformations weapply to the automaton, on top of which a minimal quotient automaton is defined .…

## Matching Patterns with Variables under Hamming Distance

A pattern $\alpha$ is a string of variables and terminal letters . We say that $\alpha$ matches a word $w$, consisting only of terminal letters, if $w$ can beobtained by replacing the variables of $alpha$ by terminal words . We show that the problem can still be solved efficiently if we allow repeated variables, but restrict the way the different variables can beinterleaved according to a locality parameter .…

## Femto Containers DevOps on Microcontrollers with Lightweight Virtualization Isolation for IoT Software Modules

The Internet of Things (IoT) connects low-power, microcontroller-based devices which take part in larger distributedcyberphysical systems . Femto-Containers can virtualize and isolate multiple software modules executed concurrently, with very small memory footprint overhead (below 10%) and very small startup time (tens of microseconds) Compared to prior work on software-based virtualization and isolation, femto-containers offer an attractive trade-off in terms of memory footprint, energy consumption, and security .…

## PAIO A Software Defined Storage Data Plane Framework

PAIO is the first general-purpose framework that enables system designers to build custom-made Software-Defined Storage (SDS) data planestages . It provides the means to implement storage optimization adaptable to workflows and user-defined policies . PAIO allows stages to beintegrated with modern SDS control planes to ensure holistic control and system-wide optimal performance .…

## Femto Containers DevOps on Microcontrollers with Lightweight Virtualization Isolation for IoT Software Modules

The Internet of Things (IoT) connects low-power, microcontroller-based devices which take part in larger distributedcyberphysical systems . Femto-Containers can virtualize and isolate multiple software modules executed concurrently, with very small memory footprint overhead (below 10%) and very small startup time (tens of microseconds) Compared to prior work on software-based virtualization and isolation, femto-containers offer an attractive trade-off in terms of memory footprint, energy consumption, and security .…

## PAIO A Software Defined Storage Data Plane Framework

PAIO is the first general-purpose framework that enables system designers to build custom-made Software-Defined Storage (SDS) data planestages . It provides the means to implement storage optimization adaptable to workflows and user-defined policies . PAIO allows stages to beintegrated with modern SDS control planes to ensure holistic control and system-wide optimal performance .…

## Recommending Multiple Criteria Decision Analysis Methods with A New Taxonomy based Decision Support System

The MCDA-MSS includes guidance to leaddecision-making processes and choose among an extensive collection of MCDA methods . These are assessed according to an original comprehensive set of problem characteristics . Theapplicability of the system has been tested on several case studies .…

## Recommending Multiple Criteria Decision Analysis Methods with A New Taxonomy based Decision Support System

The MCDA-MSS includes guidance to leaddecision-making processes and choose among an extensive collection of MCDA methods . These are assessed according to an original comprehensive set of problem characteristics . Theapplicability of the system has been tested on several case studies .…

## Low cost cloud based remote microscopy for biological sciences

A low cost remote imaging platform for biological applications was developed . The “Picroscope” is a device that allows the user to perform longitudinal imaging studies on multi-well cell culture plates . A web based console was created to control the device and view experiment results .…

## Low cost cloud based remote microscopy for biological sciences

A low cost remote imaging platform for biological applications was developed . The “Picroscope” is a device that allows the user to perform longitudinal imaging studies on multi-well cell culture plates . A web based console was created to control the device and view experiment results .…

## GearV A Two Gear Hypervisor for Mixed Criticality IoT Systems

This paper presents GearV, a two-gear lightweight hypervisor architecture to address the some known challenges . By dividing hypervisor into some partitions, dividing scheduling policies into Gear1 and Gear2 respectively, GearVcreates a consolidated platform to run best-effort system and safety-critical system simultaneously .…

## INSiDER Incorporation of system and safety analysis models using a dedicated reference model

Our approach interconnects system design and safety analysis models efficiently using a dedicated reference model . Since all information is available in astructured way, traceability between the model elements and consistency checksenable automated synchronization to guarantee that information within both kindof models are consistent during the development life-cycle .…

## INSiDER Incorporation of system and safety analysis models using a dedicated reference model

Our approach interconnects system design and safety analysis models efficiently using a dedicated reference model . Since all information is available in astructured way, traceability between the model elements and consistency checksenable automated synchronization to guarantee that information within both kindof models are consistent during the development life-cycle .…

## Reduction Using Induced Subnets To Systematically Prove Properties For Free Choice Nets

The approach is general and can be applied to different properties . We use sequences of t-induced T-nets and p-induced P-nets to convert free-choice nets into T-net and P-net . This allows for moresystematic proofs that “peel off” non-trivial parts while retaining the essence of the problem .…

## On groups presented by inverse closed finite convergent length reducing rewriting systems

We show that groups presented by inverse-closed finite convergent length-reducing rewriting systems are characterised by a striking geometric property . Cayley graphs are geodetic and side-lengths of non-degeneratetriangles are uniformly bounded . This leads to a new algebraic result: thegroup is plain (isomorphic to the free product of finitely many finite groups) if and only if a certain relation on the set ofnon-trivial finite-order elements of the group is transitive on a bounded set .…

## Free Choice Nets With Home Clusters Are Lucent

A marked Petri net is lucent if there are no two different reachable markings enabling the same set of transitions . These nets have a so-called home marking such that it is always possible to reach this marking again . Sucha home marking can serve as a regeneration point or as an end-point .…

## GearV A Two Gear Hypervisor for Mixed Criticality IoT Systems

This paper presents GearV, a two-gear lightweight hypervisor architecture to address the some known challenges . By dividing hypervisor into some partitions, dividing scheduling policies into Gear1 and Gear2 respectively, GearVcreates a consolidated platform to run best-effort system and safety-critical system simultaneously .…

## Verification in the Loop Correct by Construction Control Learning with Reach avoid Guarantees

In the current control design of safety-critical autonomous systems, formalverification techniques are typically applied after the controller is designed to evaluate whether the required properties (e.g., safety) are satisfied . However, due to the increasing system complexity and the fundamental hardnessof designing a controller with formal guarantees, such an open-loop process ofdesign-then-verify often results in many iterations and fails to provide thenecessary guarantees .…

## Closed Ziv Lempel factorization of the m bonacci words

A word $w$ is said to be closed if it has a proper factor $x$ which occurs exactly twice in $w$, as a prefix and as a suffix of $w$. We define the closed $z$-factorization of finiteand infinite words . We also classify closed prefixes of theinfinite $m$-bonacci words .…

## Performance Evaluation of Snapshot Methods to Warm the Serverless Cold Start

Serverless platforms are responsible for deploying and scaling the developer’s applications . Serverless also incorporated the pay-as-you-go billing model, which only considers the timespent processing client requests . This search forefficiency can lead to the cold start problem, which represents a delay to execute serverless applications .…