A fast radio burst associated with a Galactic magnetar

Since their discovery in 2007, much effort has been devoted to uncovering thesources of the extragalactic, millisecond-duration fast radio bursts (FRBs). Aclass of neutron star known as... | Continue reading


@arxiv.org | 3 years ago

The Myth of Robotic Efficiency: Why Human Space Exploration Tells Us More

There is a widely held view in the astronomical community that unmannedrobotic space vehicles are, and will always be, more efficient explorers ofplanetary surfaces than astronauts (e.g. Coates,... | Continue reading


@arxiv.org | 3 years ago

The asymptotic cost of address translation on memory access time

Modern computers are not random access machines (RAMs). They have a memoryhierarchy, multiple cores, and virtual memory. In this paper, we address thecomputational cost of address translation in... | Continue reading


@arxiv.org | 3 years ago

An early benchmark of quality of experience of HTTP/3 using Lighthouse

Google's QUIC (GQUIC) is an emerging transport protocol designed to reduceHTTP latency. Deployed across its platforms and positioned as an alternative toTCP+TLS, GQUIC is feature rich: offering... | Continue reading


@arxiv.org | 3 years ago

Image-to-Image Translation with Conditional Adversarial Networks (2018)

We investigate conditional adversarial networks as a general-purpose solutionto image-to-image translation problems. These networks not only learn themapping from input image to output image,... | Continue reading


@arxiv.org | 3 years ago

Re-analysis of ALMA observations of Venus: No significant detection of phosphine

Context: ALMA observations of Venus at 267 GHz have been presented in theliterature that show the apparent presence of phosphine (PH3) in itsatmosphere. Phosphine has currently no evident... | Continue reading


@arxiv.org | 3 years ago

Interpretable Machine Learning: A Brief History, State-of-the-Art and Challenges

We present a brief history of the field of interpretable machine learning(IML), give an overview of state-of-the-art interpretation methods, and discusschallenges. Research in IML has boomed in... | Continue reading


@arxiv.org | 3 years ago

Warrior1: A Performance Sanitizer for C++

This paper presents Warrior1, a tool that detects performance anti-patternsin C++ libraries. Many programs are slowed down by many small inefficiencies.Large-scale C++ applications are large,... | Continue reading


@arxiv.org | 3 years ago

DBOS: A Proposal for a Data-Centric Operating System

Current operating systems are complex systems that were designed beforetoday's computing environments. This makes it difficult for them to meet thescalability, heterogeneity, availability, and... | Continue reading


@arxiv.org | 3 years ago

Why and How Zk-Snark Works: Definitive Explanation

Despite the existence of multiple great resources on zk-SNARK construction,from original papers to explainers, due to the sheer number of moving parts thesubject remains a black box for many.... | Continue reading


@arxiv.org | 3 years ago

Data Visceralization: Enabling Deeper Understanding of Data Using VR

A fundamental part of data visualization is transforming data to map abstractinformation onto visual attributes. While this abstraction is a powerful basisfor data visualization, the connection... | Continue reading


@arxiv.org | 3 years ago

Neural Databases

In recent years, neural networks have shown impressive performance gains onlong-standing AI problems, and in particular, answering queries from naturallanguage text. These advances raise the... | Continue reading


@arxiv.org | 3 years ago

Refinement Types: A Tutorial

Refinement types enrich a language's type system with logical predicates thatcircumscribe the set of values described by the type, thereby providingsoftware developers a tunable knob with which... | Continue reading


@arxiv.org | 3 years ago

World Age in Julia: Optimizing Method Dispatch in the Presence of Eval

Dynamic programming languages face semantic and performance challenges in thepresence of features, such as eval, that can inject new code into a runningprogram. The Julia programming language... | Continue reading


@arxiv.org | 3 years ago

The Vacuity of the Open Source Security Testing Methodology Manual

The Open Source Security Testing Methodology Manual (OSSTMM) provides a"scientific methodology for the accurate characterization of operationalsecurity" [Her10, p.13]. It is extensively... | Continue reading


@arxiv.org | 3 years ago

Validating UTF-8 in Less Than One Instruction per Byte

The majority of text is stored in UTF-8, which must be validated oningestion. We present the lookup algorithm, which outperforms UTF-8 validationroutines used in many libraries and languages by... | Continue reading


@arxiv.org | 3 years ago

Cohomology fractals, Cannon-Thurston maps, and the geodesic flow

Cohomology fractals are images naturally associated to cohomology classes inhyperbolic three-manifolds. We generate these images for cusped, incomplete,and closed hyperbolic three-manifolds in... | Continue reading


@arxiv.org | 3 years ago

A Refined Laser Method and Faster Matrix Multiplication

The complexity of matrix multiplication is measured in terms of $ω$, thesmallest real number such that two $n\times n$ matrices can be multiplied using$O(n^{ω+ε})$ field... | Continue reading


@arxiv.org | 3 years ago

Abductive Knowledge Induction from Raw Data

For many reasoning-heavy tasks, it is challenging to find an appropriateend-to-end differentiable approximation to domain-specific inferencemechanisms. Neural-Symbolic (NeSy) AI divides the... | Continue reading


@arxiv.org | 3 years ago

OrbNet: DL for Quantum Chemistry Using Symmetry-Adapted Atomic-Orbital Features

We introduce a machine learning method in which energy solutions from theSchrodinger equation are predicted using symmetry adapted atomic orbitalsfeatures and a graph neural-network... | Continue reading


@arxiv.org | 3 years ago

A Berkeley View on Serverless Computing (2019&PDF)

Serverless cloud computing handles virtually all the system administrationoperations needed to make it easier for programmers to use the cloud. Itprovides an interface that greatly simplifies... | Continue reading


@arxiv.org | 3 years ago

Deep Learning for Procedural Content Generation – a survey

Procedural content generation in video games has a long history. Existingprocedural content generation methods, such as search-based, solver-based,rule-based and grammar-based methods have been... | Continue reading


@arxiv.org | 3 years ago

Fingerprinting the Fingerprinters: Detecting Browser Fingerprinting Behaviors

Browser fingerprinting is an invasive and opaque stateless trackingtechnique. Browser vendors, academics, and standards bodies have long struggledto provide meaningful protections against... | Continue reading


@arxiv.org | 3 years ago

Fixing Bias in Reconstruction-Based Anomaly Detection w Lipschitz Discriminators

Anomaly detection is of great interest in fields where abnormalities need tobe identified and corrected (e.g., medicine and finance). Deep learning methodsfor this task often rely on autoencoder... | Continue reading


@arxiv.org | 3 years ago

Sampling Optimized Code for Type Feedback

To efficiently execute dynamically typed languages, many languageimplementations have adopted a two-tier architecture. The first tier aims forlow-latency startup times and collects dynamic... | Continue reading


@arxiv.org | 3 years ago

Causality for Machine Learning

Graphical causal inference as pioneered by Judea Pearl arose from research onartificial intelligence (AI), and for a long time had little connection to thefield of machine learning. This... | Continue reading


@arxiv.org | 3 years ago

Instead of Rewriting Foreign Code for ML Automatically Synthesize Fast Gradients

Applying differentiable programming techniques and machine learningalgorithms to foreign programs requires developers to either rewrite their codein a machine learning framework, or otherwise... | Continue reading


@arxiv.org | 3 years ago

People cannot differentiate AI-generated from human-written poetry

The release of openly available, robust natural language generationalgorithms (NLG) has spurred much public attention and debate. One reason liesin the algorithms' purported ability to generate... | Continue reading


@arxiv.org | 3 years ago

How Can We Be So Dense? The Benefits of Using Highly Sparse Representations

Most artificial networks today rely on dense representations, whereasbiological networks rely on sparse representations. In this paper we show howsparse representations can be more robust to... | Continue reading


@arxiv.org | 3 years ago

Black Holes of Negative Mass

I demonstrate that, under certain circumstances, regions of negative energydensity can undergo gravitational collapse into a black hole. The resultantexterior black hole spacetimes necessarily... | Continue reading


@arxiv.org | 3 years ago

Towards ML Engineering: A Brief History of TensorFlow Extended (TFX)

Software Engineering, as a discipline, has matured over the past 5+ decades.The modern world heavily depends on it, so the increased maturity of SoftwareEngineering was an eventuality. Practices... | Continue reading


@arxiv.org | 3 years ago

A review of metadata fields associated with podcast RSS feed

Podcasts are traditionally shared through RSS feeds. As well as pointing tothe audio files, RSS gives a creator a way of providing metadata about thepodcast shows and episodes. We investigate... | Continue reading


@arxiv.org | 3 years ago

Accelerating Sparse Matrix-Matrix Multiplication with GPU Tensor Cores

Sparse general matrix-matrix multiplication (spGEMM) is an essentialcomponent in many scientific and data analytics applications. However, thesparsity pattern of the input matrices and the... | Continue reading


@arxiv.org | 3 years ago

Discovering Governing Equations from Data (2015)

The ability to discover physical laws and governing equations from data isone of humankind's greatest intellectual achievements. A quantitativeunderstanding of dynamic constraints and balances... | Continue reading


@arxiv.org | 3 years ago

egg: Fast and Extensible E-graphs

An e-graph efficiently represents a congruence relation over manyexpressions. Although they were originally developed in the late 1970s for usein automated theorem provers, a more recent... | Continue reading


@arxiv.org | 3 years ago

The Problem with NLP Leaderboards

Benchmarks such as GLUE have helped drive advances in NLP by incentivizingthe creation of more accurate models. While this leaderboard paradigm has beenremarkably successful, a historical focus... | Continue reading


@arxiv.org | 3 years ago

A Novel Approach to Generate Correctly Rounded Math Libraries for New FP Rep.

Given the importance of floating-point~(FP) performance in numerous domains,several new variants of FP and its alternatives have been proposed (e.g.,Bfloat16, TensorFloat32, and Posits). These... | Continue reading


@arxiv.org | 3 years ago

Timing Cache Accesses to Eliminate Side Channels in Shared Software

Timing side channels have been used to extract cryptographic keys andsensitive documents, even from trusted enclaves. In this paper, we focus oncache side channels created by access to shared... | Continue reading


@arxiv.org | 3 years ago

Searching for wormhole candidates in active galactic nuclei

The underlying hypothesis of this work is that the active galactic nuclei(AGNs) are wormhole mouths rather than supermassive black holes (SMBHs). Undersome - quite general - assumptions such... | Continue reading


@arxiv.org | 3 years ago

Sparse GPU Kernels for Deep Learning

Scientific workloads have traditionally exploited high levels of sparsity toaccelerate computation and reduce memory requirements. While deep neuralnetworks can be made sparse, achieving... | Continue reading


@arxiv.org | 3 years ago

Tracking Mixed Bitcoins

Mixer services purportedly remove all connections between the input(deposited) Bitcoins and the output (withdrawn) mixed Bitcoins, seeminglyrendering taint analysis tracking ineffectual. In this... | Continue reading


@arxiv.org | 3 years ago

Mastering Rate Based Curriculum Learning

Recent automatic curriculum learning algorithms, and in particularTeacher-Student algorithms, rely on the notion of learning progress, making theassumption that the good next tasks are the ones... | Continue reading


@arxiv.org | 3 years ago

Learning with Differentiable Perturbed Optimizers

Machine learning pipelines often rely on optimization procedures to makediscrete decisions (e.g., sorting, picking closest neighbors, or shortestpaths). Although these discrete decisions are... | Continue reading


@arxiv.org | 3 years ago

The Ecological Impact of High-Performance Computing in Astrophysics

The importance of computing in astronomy continues to increase, and so is itsimpact on the environment. When analyzing data or performing simulations, mostresearchers raise concerns about the... | Continue reading


@arxiv.org | 3 years ago

On the Threat of NPM Vulnerable Dependencies in Node.js Applications

Software vulnerabilities have a large negative impact on the software systemsthat we depend on daily. Reports on software vulnerabilities always paint agrim picture, with some reports showing... | Continue reading


@arxiv.org | 3 years ago

Market Ecology Explains Market Malfunction

Standard approaches to the theory of financial markets are based onequilibrium and efficiency. Here we develop an alternative based on conceptsand methods developed by biologists, in which the... | Continue reading


@arxiv.org | 3 years ago

Michelson Holography: Dual-SLM Holography with Camera-in-the-Loop Optimization

We introduce Michelson Holography (MH), a holographic display technology thatoptimizes image quality for emerging holographic near-eye displays. Using twospatial light modulators, MH is capable... | Continue reading


@arxiv.org | 3 years ago

Implicit Gradient Regularization

Gradient descent can be surprisingly good at optimizing deep neural networkswithout overfitting and without explicit regularization. We find that thediscrete steps of gradient descent implicitly... | Continue reading


@arxiv.org | 3 years ago