RDMA is Turing complete we just did not know it yet

Remote Direct Memory Access(RDMA) NICs (RNICs) are one such device, allowing applications to offloadremote memory accesses . RDMA still requires CPU intervention for complex offloads, beyond simple remote memory access . RedN can outperform one and two-sided RDMA implementations by up to 3x and 7.8x for key-value get operations and .performance…

OpenCV2X Modelling of the V2X Cellular Sidelink and Performance Evaluation for Aperiodic Traffic

This paper presents OpenCV2X, the first publicly available, open-sourcesimulation model of the Third Generation Partnership Project (3GPP) Release 14Cellular Vehicle to Everything (C-V2X) sidelink) This model forms the basis for 5GNR Mode 2 under later releases . We show how the currentsidelink scheduling mechanism performs poorly when scheduling applications with highly aperiodic communication characteristics, such as ETSI CooperativeAwareness Messages .…

A Message Passing based Adaptive PDA Algorithm for Robust Radio based Localization and Tracking

We present a message passing algorithm for localization and tracking inmultipath-prone environments . The proposed adaptive probabilistic data association algorithminfers the position of a mobile agent using multiple anchors . The algorithm adapts in an online manner to both, the time-varyingsignal-to-noise-ratio and line-of-sight (LOS) existence probability of eachanchor .…

Single Sample Prophet Inequalities Revisited

The study of the prophet inequality problem in the limited information regimewas initiated by Azar et al. [SODA’14] in the pursuit of prior-independentposted-price mechanisms . As they show, $O(1)$-competitive policies areachievable using only a single sample from the distribution of each agent .…

Analysis of QoS in Heterogeneous Networks with Clustered Deployment and Caching Aware Capacity Allocation

In cellular networks, the densification of connected devices and basestations engender the ever-growing traffic intensity . We propose the allocation ofdownlink data transmission capacity according to the cases of requestedcontents which are either cached or non-cached in nearby nodes . The throughput and delay of the allocationsystem are derived based on the approximated sojourn time of the DiscriminatoryProcessor Sharing (DPS) queue .…

SCHeMa Scheduling Scientific Containers on a Cluster of Heterogeneous Machines

SCHeMa is an open-source platform that facilitates the execution and reproducibility of computational analysis on heterogeneous clusters . It uses containerization, experiment packaging, workflow management, and machine learning technologies . SCMa is the latest open source platform to combine these technologies with machine learning and containerization to facilitate the work of scientists in this direction .…

On the ell infty norms of the Singular Vectors of Arbitrary Powers of a Difference Matrix with Applications to Sigma Delta Quantization

$C$ is a universal constant independent of both $N$ and $r$ . We show that such matrices are Bounded Orthonormal Systems (BOSs) with known upperbounds on their BOS constants . The new bounds provided herein on themaximum $ell^{\infty$-norms of their $\ell^2-normalized singular vectors allow for several previous Sigma-Delta quantization results to be generalized .…

DIALED Data Integrity Attestation for Low end Embedded Devices

The central challenge is how to securelydetect software exploits with minimal overhead . DIALED works in tandem with a companion CFA scheme to detect all (currently known) types of runtime software exploits at low-cost . Such attacks exploit softwarevulnerabilities to corrupt intermediate computation results stored in datamemory, changing neither the program code nor its control flow .…

Reward Reinforced Reinforcement Learning for Multi agent Systems

A reward-reinforced generativeadversarial network can be used as ageneric framework for multi-agent learning at the system level . We demonstrated our method isresilient and outperforms other conventional reinforcement learning methods . This method is also applied to a practical case study: maximising the number of user connections to autonomous airborne base stations in a mobile communication network .…

Non intrusive reduced order modeling of parametric electromagnetic scattering problems through Gaussian process regression

This paper is concerned with the design of a non-intrusive model orderreduction (MOR) for the system of parametric time-domain Maxwell equations . Atime- and parameter-independent reduced basis (RB) is constructed by using atwo-step proper orthogonal decomposition (POD) technique from a collection offull-order electromagnetic field solutions, which are generated via adiscontinuous Galerkin time- domain (DGTD) solver .…

A parallel implementation of a diagonalization based parallel in time integrator

We present an open-source space-and doubly-time-parallel implementation and evaluate its performance for twodifferent test problems . We use a collocationmethod of arbitrary order to add another level of parallelization in time . We derive an adaptive strategy to select a new $alpha$-circulantpreconditioner for each iteration during runtime for balancing convergencerates, round-off errors and inexactness in the individual time-steps .…

Automatic Cough Classification for Tuberculosis Screening in a Real World Environment

We present first results showing that it is possible to automatically distinguish coughing sounds produced by patients with TB and those with other lung ailments . Our experiments are based on a dataset of cough recording in a real-world clinic setting from 16 patients confirmed to besuffering from TB and 33 patients that are suffering from respiratory conditions, confirmed as other than TB .…

A geometric characterization of unstable blow up solutions with computer assisted proof

Blow-up solutions of autonomous ordinary differentialequations (ODEs) which are unstable under perturbations of initial conditions are studied . They are obtained as trajectories on stable manifolds of hyperbolic (saddle) equilibria atinfinity . In this process, important features are obtained: smooth dependenceof blow-up times on initial points near blow-ups, level set distribution ofblow-upsolutions, singular behavior of blow- upsolutions, organization of the phase space via separatrices (stable manifolds) In particular, we show that unstable blow up solutions themselves canseparate initial conditions into two regions where solution trajectories are globally bounded or blow up, no matter how large initial points are…

Human like Controllable Image Captioning with Verb specific Semantic Roles

Controllable Image Captioning (CIC) has received unprecedented attention over the last few years . We propose a new control signal for CIC: Verb-specific Semantic Roles (VSR) VSR consistsof a verb and some semantic roles, which represents a targeted activity . Given a designated VSR, we firsttrain a grounded semantic role labeling (GSRL) model to identify and ground allentities for each role .…

Using an Epidemiological Model to Study the Spread of Misinformation during the Black Lives Matter Movement

The proliferation of social media platforms like Twitter has heightened theconsequences of the spread of misinformation . To understand and model thespread of misinformation, in this paper, we leveraged the SEIZ (Susceptible,Exposed, Infected, Skeptics) epidemiological model . Applying a mathematical model can help to understand the trends and dynamics of spread ofmisinformation on Twitter and ultimately help to develop techniques to quicklyidentify and control it .…

Revisiting Dockerfiles in Open Source Software Over Time

Previous studies have analyzed Dockerfiles that are used to create container images in order to better understand how to improve Docker tooling . In this paper, we revisit the findings of previous studies using the largest set of Dockerfiles known to date with over 9.4 million unique Dockerfiles found in the World of Code infrastructure spanning from 2013-2020 .…

Characterising the Knowledge about Primitive Variables in Java Code Comments

Little work has been conducted on how often these variables are documented in code comments and what types of knowledge the comments provide about variables of primitive types . Primitive types are fundamental components available in any programminglanguage . We present an approach fordetecting primitive variables and their description in comments using lexicalmatching and advanced matching .…

What is the Vocabulary of Flaky Tests An Extended Replication

Software systems have been continuously evolved and delivered with highquality due to the widespread adoption of automated tests . A recurring issue is the presence of flaky tests, a test case that may passor fail non-deterministically . A promising, but yet lacking more empirical evidence, approach is to collect static data of automated test cases and use them topredict their flakiness .…

Mining Scientific Workflows for Anomalous Data Transfers

Modern scientific workflows are data-driven and are often executed on heterogeneous, high-performance computing infrastructures . X-FLASH incorporates novel hyperparameter tuning and data mining approaches for improving the performance of the machine learning algorithms to classify the anomalous TCP packets . The tool outperformed the existing approach up to 28\%, 29\%, and 40\% relatively for F-measure, G-score, and recall in less than30 evaluations .…

Row Polymorphic Types for Strategic Rewriting

We present a type system for strategy languages that express programtransformations as compositions of rewrite rules . Our row-polymorphic typesystem assists compiler engineers to write correct strategies by . statically rejecting compositions of rewrites that otherwise would . otherwise would failduring rewriting at runtime .…

Can I Solve It Identifying APIs Required to Complete OSS Task

Open Source Software projects add labels to open issues to help contributors choose tasks . Current automatic approaches for creating labels are mostly limited to classifying issues as a bug/non-bug . We leverage the issues’ description and the project history to build prediction models, which resulted in precision up to82% and recall up to 97.8% .…

Tracing Vulnerable Code Lineage

This paper presents results from the MSR 2021 Hackathon . Thesesecurity vulnerabilities can potentially be propagated through code reuse . We utilizethe World of Code infrastructure to discover file-level duplication of codefrom a nearly complete collection of open source software. This paper describes a method and set of tools to find all open source projects that use knownvulnerable files and any previous revisions of those files.…

Safe Multi Agent Reinforcement Learning through Decentralized Multiple Control Barrier Functions

Multi-Agent Reinforcement Learning (MARL) algorithms show amazing performance in simulation in recent years . But placing MARL in real-world applications maysuffer safety problems . MARL with centralized shields was proposed and verifiedin safety games recently . We propose to combine MARLwith decentralized Control Barrier Function (CBF) shields based on available local information .…

Epidemic Spreading and Digital Contact Tracing Effects of Heterogeneous Mixing and Quarantine Failures

Contact tracing via digital tracking applications installed on mobile phones is an important tool for controlling epidemic spreading . Our results are based on a combination of explicitsimulations and mean-field analysis . They indicate that there can be majordifferences in the epidemic size and epidemic probabilities which are equivalent in the normal SIR processes.…

Evolving Learning Rate Optimizers for Deep Neural Networks

Artificial Neural Networks (ANNs) became popular due to their successfulapplication difficult problems such as image and speech recognition . We propose a framework called AutoLR to automatically design Learning RateOptimizers . The results are competitive with the best state of the art methods, even outperforming them in some scenarios .…

Pursuing robust decisions in uncertain traffic equilibrium problems

We evaluate the robustness of agents’ traffic equilibria in randomizedrouting games characterized by an uncertain network demand with a possiblyunknown probability distribution . We extend the so-called hosemodel by considering a traffic equilibrium model where the uncertain networkdemand configuration configuration belongs to a polyhedral set, whose shape is itself a-priori unknown .…

GISE 51 A scalable isolated sound events dataset

GISE-51 is a datasetspanning 51 isolated sound events belonging to a broad domain of event types . We also release a dataset of 5-second soundscapes with hard-labelled event boundaries synthesized from Gise-51 isolated sound . We conduct baseline sound event recognition (SER) experiments on the GISE51-Mixtures dataset, benchmarking prominent convolutional neural networks,and models trained with the dataset demonstrate strong transfer learning performance on existing audio recognition benchmarks .…