Skip to main content

Showing 1–39 of 39 results for author: Acar, A

.
  1. arXiv:2407.02610  [pdf, other

    cs.LG cs.DC

    Towards Federated Learning with On-device Training and Communication in 8-bit Floating Point

    Authors: Bokun Wang, Axel Berg, Durmus Alp Emre Acar, Chuteng Zhou

    Abstract: Recent work has shown that 8-bit floating point (FP8) can be used for efficiently training neural networks with reduced computational overhead compared to training in FP32/FP16. In this work, we investigate the use of FP8 training in a federated learning context. This brings not only the usual benefits of FP8 which are desirable for on-device training at the edge, but also reduces client-server co… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  2. arXiv:2405.07453  [pdf, other

    cs.RO cs.LG

    An Effectiveness Study Across Baseline and Neural Network-based Force Estimation Methods on the da Vinci Research Kit Si System

    Authors: Hao Yang, Ayberk Acar, Keshuai Xu, Anton Deguet, Peter Kazanzides, Jie Ying Wu

    Abstract: In this study, we further investigate the robustness and generalization ability of an neural network (NN) based force estimation method, using the da Vinci Research Kit Si (dVRK-Si). To evaluate our method's performance, we compare the force estimation accuracy with several baseline methods. We conduct comparative studies between the dVRK classic and dVRK-Si systems to benchmark the effectiveness… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: Accepted by the Hamlyn Symposium on Medical Robotics 2024

  3. arXiv:2404.02999  [pdf, other

    eess.IV cs.CV

    MeshBrush: Painting the Anatomical Mesh with Neural Stylization for Endoscopy

    Authors: John J. Han, Ayberk Acar, Nicholas Kavoussi, Jie Ying Wu

    Abstract: Style transfer is a promising approach to close the sim-to-real gap in medical endoscopy. Rendering realistic endoscopic videos by traversing pre-operative scans (such as MRI or CT) can generate realistic simulations as well as ground truth camera poses and depth maps. Although image-to-image (I2I) translation models such as CycleGAN perform well, they are unsuitable for video-to-video synthesis d… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: 10 pages, 5 figures

  4. arXiv:2403.03858  [pdf, other

    cs.CR

    Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

    Authors: Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac

    Abstract: Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and inspection of hazardous locations. Due to their deployments in many civilian and military applications, safe and reliable communication of these drones througho… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: Accepted at IEEE International Conference on Communications (ICC) 2024

  5. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

    Authors: Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, Selcuk Uluagac

    Abstract: In this work, we present a device-centric analysis of security and privacy attacks and defenses on Extended Reality (XR) devices, highlighting the need for robust and privacy-aware security mechanisms. Based on our analysis, we present future research directions and propose design considerations to help ensure the security and privacy of XR devices.

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: This is the author's version of the work. It is posted here for personal/educational use only. The definitive version was published in IEEE Security & Privacy Magazine Jan/Feb 2024

    Journal ref: in IEEE Security & Privacy, vol. 22, no. 01, pp. 10-23, 2024

  6. arXiv:2402.02455  [pdf, other

    cs.CR cs.CY

    A Survey on Decentralized Identifiers and Verifiable Credentials

    Authors: Carlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti

    Abstract: Digital identity has always been considered the keystone for implementing secure and trustworthy communications among parties. The ever-evolving digital landscape has gone through many technological transformations that have also affected the way entities are digitally identified. During this digital evolution, identity management has shifted from centralized to decentralized approaches. The last… ▽ More

    Submitted 4 February, 2024; originally announced February 2024.

    Comments: 30 pages, 15 figures, and 9 tables

  7. arXiv:2401.16600  [pdf, other

    cs.CV

    Depth Anything in Medical Images: A Comparative Study

    Authors: John J. Han, Ayberk Acar, Callahan Henry, Jie Ying Wu

    Abstract: Monocular depth estimation (MDE) is a critical component of many medical tracking and map** algorithms, particularly from endoscopic or laparoscopic video. However, because ground truth depth maps cannot be acquired from real patient data, supervised learning is not a viable approach to predict depth maps for medical scenes. Although self-supervised learning for MDE has recently gained attention… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: 10 pages, 2 figures, 3 tables

  8. arXiv:2311.15123  [pdf, other

    quant-ph cs.AR cs.DC

    Atomique: A Quantum Compiler for Reconfigurable Neutral Atom Arrays

    Authors: Hanrui Wang, Pengyu Liu, Daniel Bochen Tan, Yilian Liu, Jiaqi Gu, David Z. Pan, Jason Cong, Umut A. Acar, Song Han

    Abstract: The neutral atom array has gained prominence in quantum computing for its scalability and operation fidelity. Previous works focus on fixed atom arrays (FAAs) that require extensive SWAP operations for long-range interactions. This work explores a novel architecture reconfigurable atom arrays (RAAs), also known as field programmable qubit arrays (FPQAs), which allows for coherent atom movements du… ▽ More

    Submitted 2 May, 2024; v1 submitted 25 November, 2023; originally announced November 2023.

    Comments: 17 pages, 26 figures; Published as a conference paper at ISCA 2024

  9. arXiv:2304.03753  [pdf, ps, other

    cs.PL

    Responsive Parallelism with Synchronization

    Authors: Stefan K. Muller, Kyle Singer, Devyn Terra Keeney, Andrew Neth, Kunal Agrawal, I-Ting Angelina Lee, Umut A. Acar

    Abstract: Many concurrent programs assign priorities to threads to improve responsiveness. When used in conjunction with synchronization mechanisms such as mutexes and condition variables, however, priorities can lead to priority inversions, in which high-priority threads are delayed by low-priority ones. Priority inversions in the use of mutexes are easily handled using dynamic techniques such as priority… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

  10. arXiv:2207.03031  [pdf, other

    cs.LG cs.DC

    FedHeN: Federated Learning in Heterogeneous Networks

    Authors: Durmus Alp Emre Acar, Venkatesh Saligrama

    Abstract: We propose a novel training recipe for federated learning with heterogeneous networks where each device can have different architectures. We introduce training with a side objective to the devices of higher complexities to jointly train different architectures in a federated setting. We empirically show that our approach improves the performance of different architectures and leads to high communi… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

    Comments: Workshop paper to be appear at DyNN, ICML 2022

  11. arXiv:2204.14168  [pdf, other

    cs.DC cs.DS

    DePa: Simple, Provably Efficient, and Practical Order Maintenance for Task Parallelism

    Authors: Sam Westrick, Larry Wang, Umut A. Acar

    Abstract: A number of problems in parallel computing require reasoning about the dependency structure in parallel programs. For example, dynamic race detection relies on efficient "on-the-fly" determination of dependencies between sequential and parallel tasks (e.g. to quickly determine whether or not two memory accesses occur in parallel). Several solutions to this "parallel order maintenance" problem has… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

  12. arXiv:2204.09033  [pdf, other

    cs.PL quant-ph

    Quartz: Superoptimization of Quantum Circuits (Extended Version)

    Authors: Mingkuan Xu, Zikun Li, Oded Padon, Sina Lin, Jessica Pointing, Auguste Hirth, Henry Ma, Jens Palsberg, Alex Aiken, Umut A. Acar, Zhihao Jia

    Abstract: Existing quantum compilers optimize quantum circuits by applying circuit transformations designed by experts. This approach requires significant manual effort to design and implement circuit transformations for different quantum devices, which use different gate sets, and can miss optimizations that are hard to find manually. We propose Quartz, a quantum circuit superoptimizer that automatically g… ▽ More

    Submitted 2 May, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

    Comments: 28 pages. Extended version of the paper presented in PLDI 2022. Typos corrected and artifact reference updated

  13. arXiv:2111.04263  [pdf, other

    cs.LG cs.DC

    Federated Learning Based on Dynamic Regularization

    Authors: Durmus Alp Emre Acar, Yue Zhao, Ramon Matas Navarro, Matthew Mattina, Paul N. Whatmough, Venkatesh Saligrama

    Abstract: We propose a novel federated learning method for distributively training neural network models, where the server orchestrates cooperation between a subset of randomly chosen devices in each round. We view Federated Learning problem primarily from a communication perspective and allow more device level computations to save transmission costs. We point out a fundamental dilemma, in that the minima o… ▽ More

    Submitted 9 November, 2021; v1 submitted 7 November, 2021; originally announced November 2021.

    Comments: Slightly extended version of ICLR 2021 Paper

  14. arXiv:2111.01348  [pdf, other

    stat.ML cs.LG

    Faster Algorithms for Learning Convex Functions

    Authors: Ali Siahkamari, Durmus Alp Emre Acar, Christopher Liao, Kelly Geyer, Venkatesh Saligrama, Brian Kulis

    Abstract: The task of approximating an arbitrary convex function arises in several learning problems such as convex regression, learning with a difference of convex (DC) functions, and learning Bregman or $f$-divergences. In this paper, we develop and analyze an approach for solving a broad range of convex function learning problems that is faster than state-of-the-art approaches. Our approach is based on a… ▽ More

    Submitted 19 June, 2022; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: 21 pages, 3 figures. Proceedings of the 39 th International Conference on Machine Learning, Baltimore, Maryland, USA, PMLR 162, 2022. Copy- right 2022 by the author(s)

  15. arXiv:2105.06712  [pdf, other

    cs.DC

    Efficient Parallel Self-Adjusting Computation

    Authors: Daniel Anderson, Guy E. Blelloch, Anubhav Baweja, Umut A. Acar

    Abstract: Self-adjusting computation is an approach for automatically producing dynamic algorithms from static ones. The approach works by tracking control and data dependencies, and propagating changes through the dependencies when making an update. Extensively studied in the sequential setting, some results on parallel self-adjusting computation exist, but are either only applicable to limited classes of… ▽ More

    Submitted 14 May, 2021; originally announced May 2021.

  16. arXiv:2103.08222  [pdf, ps, other

    hep-ph hep-ex

    A search for the first generation charged vector-like leptons at future colliders

    Authors: Ali Osman Acar, Osman Emre Delialioglu, Saleh Sultansoy

    Abstract: Flavor Democracy Hypothesis favors existence of iso-singlet quarks and vector-like charged leptons. Their observation at future colliders could shed light on the nature of mass and mixing patterns of known leptons and quarks, as well as Higgs boson itself. Vector-like quarks are extensively searched by ATLAS and CMS collaborations. Unfortunately, this is not the case for vector-like leptons, while… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: arXiv admin note: text overlap with arXiv:1801.03927

  17. arXiv:2103.03851  [pdf, other

    cs.CR

    SoK: Cryptojacking Malware

    Authors: Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk

    Abstract: Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware. Especially with re… ▽ More

    Submitted 26 April, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: EuroS&P 2021 Conference

  18. Program Equivalence for Assisted Grading of Functional Programs (Extended Version)

    Authors: Joshua Clune, Vijay Ramamurthy, Ruben Martins, Umut A. Acar

    Abstract: In courses that involve programming assignments, giving meaningful feedback to students is an important challenge. Human beings can give useful feedback by manually grading the programs but this is a time-consuming, labor intensive, and usually boring process. Automatic graders can be fast and scale well but they usually provide poor feedback. Although there has been research on improving automati… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

  19. arXiv:2004.06298  [pdf, other

    cs.LG stat.ML

    Budget Learning via Bracketing

    Authors: Aditya Gangrade, Durmus Alp Emre Acar, Venkatesh Saligrama

    Abstract: Conventional machine learning applications in the mobile/IoT setting transmit data to a cloud-server for predictions. Due to cost considerations (power, latency, monetary), it is desirable to minimise device-to-server transmissions. The budget learning (BL) problem poses the learner's goal as minimising use of the cloud while suffering no discernible loss in accuracy, under the constraint that the… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

    Comments: Slightly expanded version of a paper to be presented at AISTATS 2020

  20. arXiv:2004.02870  [pdf, other

    cs.PL

    Responsive Parallelism with Futures and State

    Authors: Stefan K. Muller, Kyle Singer, Noah Goldstein, Umut A. Acar, Kunal Agrawal, I-Ting Angelina Lee

    Abstract: Motivated by the increasing shift to multicore computers, recent work has developed language support for responsive parallel applications that mix compute-intensive tasks with latency-sensitive, usually interactive, tasks. These developments include calculi that allow assigning priorities to threads, type systems that can rule out priority inversions, and accompanying cost models for predicting re… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

  21. Parallel Batch-dynamic Trees via Change Propagation

    Authors: Umut A. Acar, Daniel Anderson, Guy E. Blelloch, Laxman Dhulipala, Sam Westrick

    Abstract: The dynamic trees problem is to maintain a forest subject to edge insertions and deletions while facilitating queries such as connectivity, path weights, and subtree weights. Dynamic trees are a fundamental building block of a large number of graph algorithms. Although traditionally studied in the single-update setting, dynamic algorithms capable of supporting batches of updates are increasingly r… ▽ More

    Submitted 17 May, 2020; v1 submitted 12 February, 2020; originally announced February 2020.

    Journal ref: Proceedings of The 28th Annual European Symposium on Algorithms (ESA '20) (2020) 2:1-2:23

  22. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  23. arXiv:1910.00508  [pdf, ps, other

    cs.CR

    An Analysis of Malware Trends in Enterprise Networks

    Authors: Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda

    Abstract: We present an empirical and large-scale analysis of malware samples captured from two different enterprises from 2017 to early 2018. Particularly, we perform threat vector, social-engineering, vulnerability and time-series analysis on our dataset. Unlike existing malware studies, our analysis is specifically focused on the recent enterprise malware samples. First of all, based on our analysis on t… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

  24. Parallel Batch-Dynamic Graph Connectivity

    Authors: Umut A. Acar, Daniel Anderson, Guy E. Blelloch, Laxman Dhulipala

    Abstract: In this paper, we study batch parallel algorithms for the dynamic connectivity problem, a fundamental problem that has received considerable attention in the sequential setting. The most well known sequential algorithm for dynamic connectivity is the elegant level-set algorithm of Holm, de Lichtenberg and Thorup (HDT), which achieves $O(\log^2 n)$ amortized time per edge insertion or deletion, and… ▽ More

    Submitted 17 May, 2020; v1 submitted 20 March, 2019; originally announced March 2019.

    Comments: This is the full version of the paper appearing in the ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2019

    Journal ref: Proceedings of The 31st ACM Symposium on Parallelism in Algorithms and Architectures (SPAA '19) (2019) 381-392

  25. arXiv:1809.00745  [pdf, other

    cs.CR

    IoTDots: A Digital Forensics Framework for Smart Environments

    Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac

    Abstract: IoT devices and sensors have been utilized in a cooperative manner to enable the concept of a smart environment. In these smart settings, abundant data is generated as a result of the interactions between devices and users' day-to-day activities. Such data contain valuable forensic information about events and actions occurring inside the smart environment and, if analyzed, may help hold those vio… ▽ More

    Submitted 3 September, 2018; originally announced September 2018.

  26. Peek-a-Boo: I see your smart home activities, even encrypted!

    Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac

    Abstract: A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploi… ▽ More

    Submitted 13 May, 2020; v1 submitted 8 August, 2018; originally announced August 2018.

    Comments: Update (May 13, 2020): This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8-10, 2020, Linz (Virtual Event), Austria, https://doi.org/10.1145/3395351.3399421

  27. arXiv:1807.03703  [pdf, ps, other

    cs.PL

    Competitive Parallelism: Getting Your Priorities Right

    Authors: Stefan K. Muller, Umut A. Acar, Robert Harper

    Abstract: Multi-threaded programs have traditionally fallen into one of two domains: cooperative and competitive. These two domains have traditionally remained mostly disjoint, with cooperative threading used for increasing throughput in compute-intensive applications such as scientific workloads and cooperative threading used for increasing responsiveness in interactive applications such as GUIs and games.… ▽ More

    Submitted 10 July, 2018; originally announced July 2018.

    Comments: Extended version of a paper to appear at ICFP 2018

  28. arXiv:1802.10417  [pdf, ps, other

    cs.CR

    WACA: Wearable-Assisted Continuous Authentication

    Authors: Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

    Abstract: One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable. I… ▽ More

    Submitted 5 March, 2018; v1 submitted 28 February, 2018; originally announced February 2018.

    Comments: A shorter version of this paper will appear in BioSTAR 2018 Workshop. This is the full version of the paper. 1st update: added ACK section

  29. arXiv:1709.03767  [pdf, other

    cs.DC

    Parallel Work Inflation, Memory Effects, and their Empirical Analysis

    Authors: Umut A. Acar, Arthur Charguéraud, Mike Rainey

    Abstract: In this paper, we propose an empirical method for evaluating the performance of parallel code. Our method is based on a simple idea that is surprisingly effective in hel** to identify causes of poor performance, such as high parallelization overheads, lack of adequate parallelism, and memory effects. Our method relies on only the measurement of the run time of a baseline sequential program, the… ▽ More

    Submitted 13 September, 2017; v1 submitted 12 September, 2017; originally announced September 2017.

    ACM Class: D.1.3

  30. arXiv:1707.01871  [pdf, other

    cs.CR

    Achieving Secure and Differentially Private Computations in Multiparty Settings

    Authors: Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed parties to make computations while the parties learn nothing about their data, but the final result. Although SMC is instrumental in such distributed settings, it do… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  31. arXiv:1704.03578  [pdf, other

    cs.CR

    A Survey on Homomorphic Encryption Schemes: Theory and Implementation

    Authors: Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti

    Abstract: Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. Especially with popular cloud services, the control over the privacy of the sensitive data is lost. Even when the keys are not shared, the encrypted material is shared with a third party that does not necessarily need to a… ▽ More

    Submitted 5 October, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: - Updated. (October 6, 2017) - This paper is an early draft of the survey that is being submitted to ACM CSUR and has been uploaded to arXiv for feedback from stakeholders

    ACM Class: E.3; K.6.5; K.4.1

  32. arXiv:1702.08342  [pdf, other

    cs.CR cs.PL

    Curie: Policy-based Secure Data Exchange

    Authors: Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Data sharing among partners---users, organizations, companies---is crucial for the advancement of data analytics in many domains. Sharing through secure computation and differential privacy allows these partners to perform private computations on their sensitive data in controlled ways. However, in reality, there exist complex relationships among members. Politics, regulations, interest, trust, da… ▽ More

    Submitted 9 February, 2019; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: updated (this version has been accepted to CODASPY 2019)

  33. Database Queries that Explain their Work

    Authors: James Cheney, Amal Ahmed, Umut A. Acar

    Abstract: Provenance for database queries or scientific workflows is often motivated as providing explanation, increasing understanding of the underlying data sources and processes used to compute the query, and reproducibility, the capability to recompute the results on different inputs, possibly specialized to a part of the output. Many provenance systems claim to provide such capabilities; however, most… ▽ More

    Submitted 12 August, 2014; v1 submitted 7 August, 2014; originally announced August 2014.

    Comments: PPDP 2014

    ACM Class: D.3.0; D.3.3

  34. A Core Calculus for Provenance

    Authors: Umut A. Acar, Amal Ahmed, James Cheney, Roly Perera

    Abstract: Provenance is an increasing concern due to the ongoing revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer systems will need to become provenance-aware in order to provide satisfactory accountability, reproducibility, and trust for scientific or other high-value data. To date, there is not a consensus concerning appropria… ▽ More

    Submitted 3 January, 2014; v1 submitted 23 October, 2013; originally announced October 2013.

    Journal ref: Journal of Computer Security 21 (2013) 919-969

  35. arXiv:1206.3234  [pdf

    cs.DS cs.AI

    Adaptive Inference on General Graphical Models

    Authors: Umut A. Acar, Alexander T. Ihler, Ramgopal Mettu, Ozgur Sumer

    Abstract: Many algorithms and applications involve repeatedly solving variations of the same inference problem; for example we may want to introduce new evidence to the model or perform updates to conditional dependencies. The goal of adaptive inference is to take advantage of what is preserved in the model and perform inference more rapidly than from scratch. In this paper, we describe techniques for adapt… ▽ More

    Submitted 13 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the Twenty-Fourth Conference on Uncertainty in Artificial Intelligence (UAI2008)

    Report number: UAI-P-2008-PG-1-8

  36. arXiv:1108.3265  [pdf, other

    cs.PL

    Self-Adjusting Stack Machines

    Authors: Matthew A. Hammer, Georg Neis, Yan Chen, Umut A. Acar

    Abstract: Self-adjusting computation offers a language-based approach to writing programs that automatically respond to dynamically changing data. Recent work made significant progress in develo** sound semantics and associated implementations of self-adjusting computation for high-level, functional languages. These techniques, however, do not address issues that arise for low-level languages, i.e., stack… ▽ More

    Submitted 16 August, 2011; originally announced August 2011.

    Comments: Full version of our OOPLSA 2011 paper. Contains a couple of additional sections as well as an appendix with our proofs

  37. arXiv:1106.0478  [pdf, other

    cs.PL

    A Consistent Semantics of Self-Adjusting Computation

    Authors: Umut A. Acar, Matthias Blume, Jacob Donham

    Abstract: This paper presents a semantics of self-adjusting computation and proves that the semantics are correct and consistent. The semantics integrate change propagation with the classic idea of memoization to enable reuse of computations under mutation to memory. During evaluation, reuse of a computation via memoization triggers a change propagation that adjusts the reused computation to reflect the mut… ▽ More

    Submitted 2 June, 2011; originally announced June 2011.

    Comments: 91 pages including the full Twelf proof in the appendix. This paper is a full version of the conference paper (published in European Symposium on Programming, ESOP, 2007)

    Report number: CMU-CS-2007-18

  38. arXiv:1106.0447  [pdf, ps, other

    cs.PL

    Selective Memoization

    Authors: Umut A. Acar, Guy E. Blelloch, Robert Harper

    Abstract: This paper presents language techniques for applying memoization selectively. The techniques provide programmer control over equality, space usage, and identification of precise dependences so that memoization can be applied according to the needs of an application. Two key properties of the approach are that it accepts and efficient implementation and yields programs whose performance can be anal… ▽ More

    Submitted 2 June, 2011; originally announced June 2011.

    Comments: Total of 31 pages. This is the full version of a conference paper with the same title that appears in ACM Conference on Principles of Programming Languages (POPL) in 2003

  39. arXiv:cs/0407025  [pdf

    cs.MA

    An agent framework for dynamic agent retraining: Agent academy

    Authors: P. Mitkas, A. Symeonidis, D. Kechagias, I. N. Athanasiadis, G. Laleci, G. Kurt, Y. Kabak, A. Acar, A. Dogac

    Abstract: Agent Academy (AA) aims to develop a multi-agent society that can train new agents for specific or general tasks, while constantly retraining existing agents in a recursive mode. The system is based on collecting information both from the environment and the behaviors of the acting agents and their related successes/failures to generate a body of data, stored in the Agent Use Repository, which i… ▽ More

    Submitted 10 July, 2004; originally announced July 2004.

    Journal ref: In B. Stanford-Smith, E. Chiozza, and M. Edin, editors, Challenges and Achievements in e-business and e-work, pages 757-764, Prague, Czech Republic, October 2002. IOS Press