Since their discovery in 2007, much effort has been devoted to uncovering thesources of the extragalactic, millisecond-duration fast radio bursts (FRBs). Aclass of neutron star known as... | Continue reading
There is a widely held view in the astronomical community that unmannedrobotic space vehicles are, and will always be, more efficient explorers ofplanetary surfaces than astronauts (e.g. Coates,... | Continue reading
Modern computers are not random access machines (RAMs). They have a memoryhierarchy, multiple cores, and virtual memory. In this paper, we address thecomputational cost of address translation in... | Continue reading
Google's QUIC (GQUIC) is an emerging transport protocol designed to reduceHTTP latency. Deployed across its platforms and positioned as an alternative toTCP+TLS, GQUIC is feature rich: offering... | Continue reading
We investigate conditional adversarial networks as a general-purpose solutionto image-to-image translation problems. These networks not only learn themapping from input image to output image,... | Continue reading
Context: ALMA observations of Venus at 267 GHz have been presented in theliterature that show the apparent presence of phosphine (PH3) in itsatmosphere. Phosphine has currently no evident... | Continue reading
We present a brief history of the field of interpretable machine learning(IML), give an overview of state-of-the-art interpretation methods, and discusschallenges. Research in IML has boomed in... | Continue reading
This paper presents Warrior1, a tool that detects performance anti-patternsin C++ libraries. Many programs are slowed down by many small inefficiencies.Large-scale C++ applications are large,... | Continue reading
Current operating systems are complex systems that were designed beforetoday's computing environments. This makes it difficult for them to meet thescalability, heterogeneity, availability, and... | Continue reading
Despite the existence of multiple great resources on zk-SNARK construction,from original papers to explainers, due to the sheer number of moving parts thesubject remains a black box for many.... | Continue reading
A fundamental part of data visualization is transforming data to map abstractinformation onto visual attributes. While this abstraction is a powerful basisfor data visualization, the connection... | Continue reading
In recent years, neural networks have shown impressive performance gains onlong-standing AI problems, and in particular, answering queries from naturallanguage text. These advances raise the... | Continue reading
Refinement types enrich a language's type system with logical predicates thatcircumscribe the set of values described by the type, thereby providingsoftware developers a tunable knob with which... | Continue reading
Dynamic programming languages face semantic and performance challenges in thepresence of features, such as eval, that can inject new code into a runningprogram. The Julia programming language... | Continue reading
The Open Source Security Testing Methodology Manual (OSSTMM) provides a"scientific methodology for the accurate characterization of operationalsecurity" [Her10, p.13]. It is extensively... | Continue reading
The majority of text is stored in UTF-8, which must be validated oningestion. We present the lookup algorithm, which outperforms UTF-8 validationroutines used in many libraries and languages by... | Continue reading
Cohomology fractals are images naturally associated to cohomology classes inhyperbolic three-manifolds. We generate these images for cusped, incomplete,and closed hyperbolic three-manifolds in... | Continue reading
The complexity of matrix multiplication is measured in terms of $ω$, thesmallest real number such that two $n\times n$ matrices can be multiplied using$O(n^{ω+ε})$ field... | Continue reading
For many reasoning-heavy tasks, it is challenging to find an appropriateend-to-end differentiable approximation to domain-specific inferencemechanisms. Neural-Symbolic (NeSy) AI divides the... | Continue reading
We introduce a machine learning method in which energy solutions from theSchrodinger equation are predicted using symmetry adapted atomic orbitalsfeatures and a graph neural-network... | Continue reading
Serverless cloud computing handles virtually all the system administrationoperations needed to make it easier for programmers to use the cloud. Itprovides an interface that greatly simplifies... | Continue reading
Procedural content generation in video games has a long history. Existingprocedural content generation methods, such as search-based, solver-based,rule-based and grammar-based methods have been... | Continue reading
Browser fingerprinting is an invasive and opaque stateless trackingtechnique. Browser vendors, academics, and standards bodies have long struggledto provide meaningful protections against... | Continue reading
Anomaly detection is of great interest in fields where abnormalities need tobe identified and corrected (e.g., medicine and finance). Deep learning methodsfor this task often rely on autoencoder... | Continue reading
To efficiently execute dynamically typed languages, many languageimplementations have adopted a two-tier architecture. The first tier aims forlow-latency startup times and collects dynamic... | Continue reading
Graphical causal inference as pioneered by Judea Pearl arose from research onartificial intelligence (AI), and for a long time had little connection to thefield of machine learning. This... | Continue reading
Applying differentiable programming techniques and machine learningalgorithms to foreign programs requires developers to either rewrite their codein a machine learning framework, or otherwise... | Continue reading
The release of openly available, robust natural language generationalgorithms (NLG) has spurred much public attention and debate. One reason liesin the algorithms' purported ability to generate... | Continue reading
Most artificial networks today rely on dense representations, whereasbiological networks rely on sparse representations. In this paper we show howsparse representations can be more robust to... | Continue reading
I demonstrate that, under certain circumstances, regions of negative energydensity can undergo gravitational collapse into a black hole. The resultantexterior black hole spacetimes necessarily... | Continue reading
Software Engineering, as a discipline, has matured over the past 5+ decades.The modern world heavily depends on it, so the increased maturity of SoftwareEngineering was an eventuality. Practices... | Continue reading
Podcasts are traditionally shared through RSS feeds. As well as pointing tothe audio files, RSS gives a creator a way of providing metadata about thepodcast shows and episodes. We investigate... | Continue reading
Sparse general matrix-matrix multiplication (spGEMM) is an essentialcomponent in many scientific and data analytics applications. However, thesparsity pattern of the input matrices and the... | Continue reading
The ability to discover physical laws and governing equations from data isone of humankind's greatest intellectual achievements. A quantitativeunderstanding of dynamic constraints and balances... | Continue reading
An e-graph efficiently represents a congruence relation over manyexpressions. Although they were originally developed in the late 1970s for usein automated theorem provers, a more recent... | Continue reading
Benchmarks such as GLUE have helped drive advances in NLP by incentivizingthe creation of more accurate models. While this leaderboard paradigm has beenremarkably successful, a historical focus... | Continue reading
Given the importance of floating-point~(FP) performance in numerous domains,several new variants of FP and its alternatives have been proposed (e.g.,Bfloat16, TensorFloat32, and Posits). These... | Continue reading
Timing side channels have been used to extract cryptographic keys andsensitive documents, even from trusted enclaves. In this paper, we focus oncache side channels created by access to shared... | Continue reading
The underlying hypothesis of this work is that the active galactic nuclei(AGNs) are wormhole mouths rather than supermassive black holes (SMBHs). Undersome - quite general - assumptions such... | Continue reading
Scientific workloads have traditionally exploited high levels of sparsity toaccelerate computation and reduce memory requirements. While deep neuralnetworks can be made sparse, achieving... | Continue reading
Mixer services purportedly remove all connections between the input(deposited) Bitcoins and the output (withdrawn) mixed Bitcoins, seeminglyrendering taint analysis tracking ineffectual. In this... | Continue reading
Recent automatic curriculum learning algorithms, and in particularTeacher-Student algorithms, rely on the notion of learning progress, making theassumption that the good next tasks are the ones... | Continue reading
Machine learning pipelines often rely on optimization procedures to makediscrete decisions (e.g., sorting, picking closest neighbors, or shortestpaths). Although these discrete decisions are... | Continue reading
The importance of computing in astronomy continues to increase, and so is itsimpact on the environment. When analyzing data or performing simulations, mostresearchers raise concerns about the... | Continue reading
Software vulnerabilities have a large negative impact on the software systemsthat we depend on daily. Reports on software vulnerabilities always paint agrim picture, with some reports showing... | Continue reading
Standard approaches to the theory of financial markets are based onequilibrium and efficiency. Here we develop an alternative based on conceptsand methods developed by biologists, in which the... | Continue reading
We introduce Michelson Holography (MH), a holographic display technology thatoptimizes image quality for emerging holographic near-eye displays. Using twospatial light modulators, MH is capable... | Continue reading
Gradient descent can be surprisingly good at optimizing deep neural networkswithout overfitting and without explicit regularization. We find that thediscrete steps of gradient descent implicitly... | Continue reading