Search results for "Theoretical Computer Science"

showing 10 items of 1151 documents

Large-scale genome-wide association studies on a GPU cluster using a CUDA-accelerated PGAS programming model

2015

[Abstract] Detecting epistasis, such as 2-SNP interactions, in genome-wide association studies (GWAS) is an important but time consuming operation. Consequently, GPUs have already been used to accelerate these studies, reducing the runtime for moderately-sized datasets to less than 1 hour. However, single-GPU approaches cannot perform large-scale GWAS in reasonable time. In this work we present multiEpistSearch, a tool to detect epistasis that works on GPU clusters. While CUDA is used for parallelization within each GPU, the workload distribution among GPUs is performed with Unified Parallel C++ (UPC++), a novel extension of C++ that follows the Partitioned Global Address Space (PGAS) model…

Scale (ratio)BioinformaticsComputer sciencePGASGPUCUDAGenome-wide association studyParallel computingGPU clusterSoftware_PROGRAMMINGTECHNIQUESTheoretical Computer ScienceComputational scienceCUDAHardware and ArchitectureUnified Parallel CProgramming paradigmPartitioned global address spacecomputerUPC++Softwarecomputer.programming_languageThe International Journal of High Performance Computing Applications
researchProduct

The fixed angle scattering problem and wave equation inverse problems with two measurements

2019

We consider two formally determined inverse problems for the wave equation in more than one space dimension. Motivated by the fixed angle inverse scattering problem, we show that a compactly supported potential is uniquely determined by the far field pattern generated by plane waves coming from exactly two opposite directions. This implies that a reflection symmetric potential is uniquely determined by its fixed angle scattering data. We also prove a Lipschitz stability estimate for an associated problem. Motivated by the point source inverse problem in geophysics, we show that a compactly supported potential is uniquely determined from boundary measurements of the waves generated by exactl…

ScatteringApplied Mathematics010102 general mathematicsMathematical analysisPlane waveBoundary (topology)Inverse problemWave equationLipschitz continuity01 natural sciencesinversio-ongelmatComputer Science ApplicationsTheoretical Computer Science010101 applied mathematicsMathematics - Analysis of PDEs35R30Signal ProcessingInverse scattering problemReflection (physics)FOS: Mathematics0101 mathematicsMathematical PhysicsMathematicsAnalysis of PDEs (math.AP)
researchProduct

A sampling method for detecting buried objects using electromagnetic scattering

2005

We consider a simple (but fully three-dimensional) mathematical model for the electromagnetic exploration of buried, perfect electrically conducting objects within the soil underground. Moving an electric device parallel to the ground at constant height in order to generate a magnetic field, we measure the induced magnetic field within the device, and factor the underlying mathematics into a product of three operations which correspond to the primary excitation, some kind of reflection on the surface of the buried object(s) and the corresponding secondary excitation, respectively. Using this factorization we are able to give a justification of the so-called sampling method from inverse scat…

Scatteringbusiness.industryApplied MathematicsAcoustics510 MathematikInverse problemComputer Science ApplicationsTheoretical Computer ScienceMagnetic field510 MathematicsOpticsFactorizationSignal ProcessingInverse scattering problemReflection (physics)Scattering theorybusinessMathematical PhysicsExcitationMathematicsInverse Problems
researchProduct

Checkpointing Workflows for Fail-Stop Errors

2017

International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…

ScheduleComputer scienceworkflowDistributed computing[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010103 numerical & computational mathematics02 engineering and technologyParallel computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesTheoretical Computer Science[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]checkpointfail-stop error0202 electrical engineering electronic engineering information engineeringOverhead (computing)[INFO]Computer Science [cs]0101 mathematicsresilienceClass (computer programming)020203 distributed computingJob shop schedulingProbabilistic logic020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationDynamic programmingTask (computing)[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]WorkflowComputational Theory and MathematicsHardware and Architecture[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Task analysis[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Software
researchProduct

An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

2015

Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …

Scheme (programming language)AuthenticationProperty (philosophy)Theoretical computer scienceTraceabilityDatabaseComputer scienceAuthentication schemecomputer.software_genreSignature (logic)Set (abstract data type)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAttribute treecomputercomputer.programming_language
researchProduct

Fast narrowing-driven partial evaluation for inductively sequential programs

2005

Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good results on small programs, it does not scale up well to realistic problems (e.g., interpreter specialization). In this work, we introduce a faster partial evaluation scheme by ensuring the termination of the process offline . For this purpose, we first characterize a class of programs which are quasi-terminating , i.e., the computations performed with needed narrowing—the symbolic computation mechanism of narrowing-driven partial evaluation—only contain finitely many different terms (and, thus, partial evaluation termi…

Scheme (programming language)Class (computer programming)Functional programmingTheoretical computer scienceComputer scienceComputationProgram transformationcomputer.software_genreSymbolic computationComputer Graphics and Computer-Aided DesignPartial evaluationProgram analysisLogical programmingSpecialization (logic)Automatic programmingcomputerSoftwareInterpretercomputer.programming_languageProceedings of the tenth ACM SIGPLAN international conference on Functional programming
researchProduct

“Anti-Bayesian” flat and hierarchical clustering using symmetric quantiloids

2017

A myriad of works has been published for achieving data clustering based on the Bayesian paradigm, where the clustering sometimes resorts to Naive-Bayes decisions. Within the domain of clustering, the Bayesian principle corresponds to assigning the unlabelled samples to the cluster whose mean (or centroid) is the closest. Recently, Oommen and his co-authors have proposed a novel, counter-intuitive and pioneering PR scheme that is radically opposed to the Bayesian principle. The rational for this paradigm, referred to as the “Anti-Bayesian” (AB) paradigm, involves classification based on the non-central quantiles of the distributions. The first-reported work to achieve clustering using the A…

Scheme (programming language)Information Systems and ManagementTheoretical computer scienceComputer scienceBayesian principleBayesian probabilityVDP::Matematikk og Naturvitenskap: 400::Matematikk: 410::Statistikk: 412Multivariate normal distribution0102 computer and information sciences02 engineering and technology01 natural sciencesDomain (mathematical analysis)ClusteringTheoretical Computer ScienceArtificial Intelligence0103 physical sciencesCluster (physics)0202 electrical engineering electronic engineering information engineering010306 general physicsCluster analysiscomputer.programming_languageCentroidComputer Science ApplicationsHierarchical clustering010201 computation theory & mathematicsControl and Systems EngineeringAnti-Bayesian classification020201 artificial intelligence & image processingcomputerSoftwareQuantiloidsQuantile
researchProduct

Upper bound on the communication complexity of private information retrieval

1997

We construct a scheme for private information retrieval with k databases and communication complexity O(n 1/(2k−1) ).

Scheme (programming language)Information retrievalTheoretical computer scienceComputer scienceBoolean circuitConstruct (python library)Communication complexityUpper and lower boundscomputerPrivate information retrievalcomputer.programming_language
researchProduct

Multi-pass execution of functional logic programs

1994

An operational semantics for functional logic programs is presented. In such programs functional terms provide for reduction of expressions, provided that they ground. The semantics is based on multi-pass evaluation techniques originally developed for attribute grammars. Program execution is divided into two phases: (1) construction of an incomplete proof tree, and (2) its decoration into a complete proof tree. The construction phase applies a modified SLD-resolution scheme, and the decoration phase a partial (multi-pass) traversal over the tree. The phase partition is generated by static analysis where data dependencies are extracted for the functional elements of the program. The method g…

Scheme (programming language)Theoretical computer scienceComputer scienceSemantics (computer science)Programming languageStatic analysiscomputer.software_genrePartition (database)Operational semanticsTree (data structure)Tree traversalRule-based machine translationcomputercomputer.programming_languageProceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '94
researchProduct

Embedding Evolution in Epidemic-Style Forwarding

2007

International audience; In this work, we introduce a framework to let forwarding schemes evolve in order to adapt to changing and a priori unknown environments. The framework is inspired by genetic algorithms: at each node a genotype describes the forwarding scheme used, a selection process fosters the diffusion of the fittest genotypes in the system and new genotypes are created by combining existing ones or applying random changes. A case study implementation is presented and its performance evaluated via numerical simulations.

Scheme (programming language)Theoretical computer scienceComputer scienceSurvival of the fittestNode (networking)Quality control and genetic algorithmsProcess (computing)Quantitative Biology::Genomics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]EmbeddingQuantitative Biology::Populations and EvolutioncomputerSelection (genetic algorithm)computer.programming_language
researchProduct