Skip to main content

Showing 1–22 of 22 results for author: Howard, H

.
  1. arXiv:2407.00106  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI

    Authors: Ilia Shumailov, Jamie Hayes, Eleni Triantafillou, Guillermo Ortiz-Jimenez, Nicolas Papernot, Matthew Jagielski, Itay Yona, Heidi Howard, Eugene Bagdasaryan

    Abstract: Exact unlearning was first introduced as a privacy mechanism that allowed a user to retract their data from machine learning models on request. Shortly after, inexact schemes were proposed to mitigate the impractical costs associated with exact unlearning. More recently unlearning is often discussed as an approach for removal of impermissible knowledge i.e. knowledge that the model should not poss… ▽ More

    Submitted 27 June, 2024; originally announced July 2024.

  2. arXiv:2406.17455  [pdf, other

    cs.DC cs.FL cs.SE

    Smart Casual Verification of CCF's Distributed Consensus and Consistency Protocols

    Authors: Heidi Howard, Markus A. Kuppe, Edward Ashton, Amaury Chamayou, Natacha Crooks

    Abstract: The Confidential Consortium Framework (CCF) is an open-source platform for develo** trustworthy and reliable cloud applications. CCF powers Microsoft's Azure Confidential Ledger service and as such it is vital to build confidence in the correctness of CCF's design and implementation. This paper reports our experiences applying smart casual verification to validate the correctness of CCF's novel… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  3. arXiv:2404.18048  [pdf, ps, other

    cs.DC cs.LO

    Scalable, Interpretable Distributed Protocol Verification by Inductive Proof Slicing

    Authors: William Schultz, Edward Ashton, Heidi Howard, Stavros Tripakis

    Abstract: Many techniques for automated inference of inductive invariants for distributed protocols have been developed over the past several years, but their performance can still be unpredictable and their failure modes opaque for large-scale verification tasks. In this paper, we present inductive proof slicing, a new automated, compositional technique for inductive invariant inference that scales effecti… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  4. arXiv:2404.01593  [pdf, other

    cs.DC cs.DB

    Optimizing Distributed Protocols with Query Rewrites [Technical Report]

    Authors: David Chu, Rithvik Panchapakesan, Shadaj Laddad, Lucky Katahanas, Chris Liu, Kaushik Shivakumar, Natacha Crooks, Joseph M. Hellerstein, Heidi Howard

    Abstract: Distributed protocols such as 2PC and Paxos lie at the core of many systems in the cloud, but standard implementations do not scale. New scalable distributed protocols are developed through careful analysis and rewrites, but this process is ad hoc and error-prone. This paper presents an approach for scaling any distributed protocol by applying rule-driven rewrites, borrowing from query optimizatio… ▽ More

    Submitted 2 April, 2024; v1 submitted 3 January, 2024; originally announced April 2024.

    Comments: Technical report of paper accepted at SIGMOD 2024

  5. arXiv:2403.13793  [pdf, other

    cs.LG

    Evaluating Frontier Models for Dangerous Capabilities

    Authors: Mary Phuong, Matthew Aitchison, Elliot Catt, Sarah Cogan, Alexandre Kaskasoli, Victoria Krakovna, David Lindner, Matthew Rahtz, Yannis Assael, Sarah Hodkinson, Heidi Howard, Tom Lieberum, Ramana Kumar, Maria Abi Raad, Albert Webson, Lewis Ho, Sharon Lin, Sebastian Farquhar, Marcus Hutter, Gregoire Deletang, Anian Ruoss, Seliem El-Sayed, Sasha Brown, Anca Dragan, Rohin Shah , et al. (2 additional authors not shown)

    Abstract: To understand the risks posed by a new AI system, we must understand what it can and cannot do. Building on prior work, we introduce a programme of new "dangerous capability" evaluations and pilot them on Gemini 1.0 models. Our evaluations cover four areas: (1) persuasion and deception; (2) cyber-security; (3) self-proliferation; and (4) self-reasoning. We do not find evidence of strong dangerous… ▽ More

    Submitted 5 April, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

  6. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1092 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 14 June, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  7. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  8. arXiv:2311.09929  [pdf, other

    cs.DC

    Mutating etcd Towards Edge Suitability

    Authors: Andrew Jeffery, Heidi Howard, Richard Mortier

    Abstract: In the edge environment servers are no longer being co-located away from clients, instead they are being co-located with clients away from other servers, focusing on reliable and performant operation. Orchestration platforms, such as Kubernetes, are a key system being transitioned to the edge but they remain unsuited to the environment, stemming primarily from their critical key-value stores. In t… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

  9. arXiv:2310.11559  [pdf, other

    cs.CR cs.DC

    Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability

    Authors: Heidi Howard, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud, Cedric Fournet, Andrew Jeffery, Matthew Kerner, Fotios Kounelis, Markus A. Kuppe, Julien Maffre, Mark Russinovich, Christoph M. Wintersteiger

    Abstract: Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential properties for trustworthy data systems. The rise of cloud computing and the growing demand for multiparty applications however means that building modern CIA systems is more challenging than ever. In response, we present the Confidential Consortium Framework (CCF), a general-purpose foundation for deve… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: 16 pages, 9 figures. To appear in the Proceedings of the VLDB Endowment, Volume 17

  10. arXiv:2209.10571  [pdf, other

    quant-ph cond-mat.other cond-mat.str-el

    Subspace Diagonalization on Quantum Computers using Eigenvector Continuation

    Authors: Akhil Francis, Anjali A. Agrawal, Jack H. Howard, Efekan Kökcü, A. F. Kemper

    Abstract: Quantum subspace diagonalization (QSD) methods are quantum-classical hybrid methods, commonly used to find ground and excited state energies by projecting the Hamiltonian to a smaller subspace. In applying these, the choice of subspace basis is critical from the perspectives of basis completeness and efficiency of implementation on quantum computers. In this work, we present Eigenvector Continuati… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: 13 pages, 10 figures

  11. arXiv:2205.11652  [pdf, other

    cs.DC

    BeeGees: stayin' alive in chained BFT

    Authors: Ittai Abraham, Natacha Crooks, Neil Giridharan, Heidi Howard, Florian Suri-Payer

    Abstract: Modern chained Byzantine Fault Tolerant (BFT) systems leverage a combination of pipelining and leader rotation to obtain both efficiency and fairness. These protocols, however, require a sequence of three or four consecutive honest leaders to commit operations. Therefore, even simple leader failures such as crashes can weaken liveness both theoretically and practically. Obtaining a chained BFT pro… ▽ More

    Submitted 26 January, 2023; v1 submitted 23 May, 2022; originally announced May 2022.

  12. arXiv:2203.03058  [pdf, ps, other

    cs.DC

    Relaxed Paxos: Quorum Intersection Revisited (Again)

    Authors: Heidi Howard, Richard Mortier

    Abstract: Distributed consensus, the ability to reach agreement in the face of failures, is a fundamental primitive for constructing reliable distributed systems. The Paxos algorithm is synonymous with consensus and widely utilized in production. Paxos uses two phases: phase one and phase two, each requiring a quorum of acceptors, to reach consensus during a round of the protocol. Traditionally, Paxos requi… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: to be published in the 9th Workshop on Principles and Practice of Consistency for Distributed Data (PaPoC'22)

  13. arXiv:2104.04102  [pdf, other

    cs.DC

    Read-Write Quorum Systems Made Practical

    Authors: Michael Whittaker, Aleksey Charapko, Joseph M. Hellerstein, Heidi Howard, Ion Stoica

    Abstract: Quorum systems are a powerful mechanism for ensuring the consistency of replicated data. Production systems usually opt for majority quorums due to their simplicity and fault tolerance, but majority quorum systems provide poor throughput and scalability. Alternatively, researchers have invented a number of theoretically "optimal" quorum systems, but the underlying theory ignores many practical com… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Comments: To be published in PaPoC 2021 (https://papoc-workshop.github.io/2021/)

  14. Rearchitecting Kubernetes for the Edge

    Authors: Andrew Jeffery, Heidi Howard, Richard Mortier

    Abstract: Recent years have seen Kubernetes emerge as a primary choice for container orchestration. Kubernetes largely targets the cloud environment but new use cases require performant, available and scalable orchestration at the edge. Kubernetes stores all cluster state in etcd, a strongly consistent key-value store. We find that at larger etcd cluster sizes, offering higher availability, write request la… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

    Comments: 6 pages. Accepted in EdgeSys '21

    Journal ref: Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking (2021) 7-12

  15. arXiv:2012.15762  [pdf, other

    cs.DC

    Scaling Replicated State Machines with Compartmentalization [Technical Report]

    Authors: Michael Whittaker, Ailidani Ailijiang, Aleksey Charapko, Murat Demirbas, Neil Giridharan, Joseph M. Hellerstein, Heidi Howard, Ion Stoica, Adriana Szekeres

    Abstract: State machine replication protocols, like MultiPaxos and Raft, are a critical component of many distributed systems and databases. However, these protocols offer relatively low throughput due to several bottlenecked components. Numerous existing protocols fix different bottlenecks in isolation but fall short of a complete solution. When you fix one bottleneck, another arises. In this paper, we int… ▽ More

    Submitted 16 May, 2021; v1 submitted 31 December, 2020; originally announced December 2020.

    Comments: Technical Report

  16. arXiv:2012.00472  [pdf, other

    cs.DC cs.CR cs.DB

    Byzantine Eventual Consistency and the Fundamental Limits of Peer-to-Peer Databases

    Authors: Martin Kleppmann, Heidi Howard

    Abstract: Sybil attacks, in which a large number of adversary-controlled nodes join a network, are a concern for many peer-to-peer database systems, necessitating expensive countermeasures such as proof-of-work. However, there is a category of database applications that are, by design, immune to Sybil attacks because they can tolerate arbitrary numbers of Byzantine-faulty nodes. In this paper, we characteri… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

  17. arXiv:2008.02671  [pdf, other

    cs.DC

    Fast Flexible Paxos: Relaxing Quorum Intersection for Fast Paxos

    Authors: Heidi Howard, Aleksey Charapko, Richard Mortier

    Abstract: Paxos, the de facto standard approach to solving distributed consensus, operates in two phases, each of which requires an intersecting quorum of nodes. Multi-Paxos reduces this to one phase by electing a leader but this leader is also a performance bottleneck. Fast Paxos bypasses the leader but has stronger quorum intersection requirements. In this paper we observe that Fast Paxos' intersection… ▽ More

    Submitted 16 October, 2020; v1 submitted 6 August, 2020; originally announced August 2020.

    Comments: To be published in the Proceedings of International Conference on Distributed Computing and Networking 2021 (ICDCN '21)

  18. arXiv:2007.09468  [pdf, other

    cs.DC

    Matchmaker Paxos: A Reconfigurable Consensus Protocol [Technical Report]

    Authors: Michael Whittaker, Neil Giridharan, Adriana Szekeres, Joseph M. Hellerstein, Heidi Howard, Faisal Nawab, Ion Stoica

    Abstract: State machine replication protocols, like MultiPaxos and Raft, are at the heart of nearly every strongly consistent distributed database. To tolerate machine failures, these protocols must replace failed machines with live machines, a process known as reconfiguration. Reconfiguration has become increasingly important over time as the need for frequent reconfiguration has grown. Despite this, recon… ▽ More

    Submitted 20 July, 2020; v1 submitted 18 July, 2020; originally announced July 2020.

  19. Paxos vs Raft: Have we reached consensus on distributed consensus?

    Authors: Heidi Howard, Richard Mortier

    Abstract: Distributed consensus is a fundamental primitive for constructing fault-tolerant, strongly-consistent distributed systems. Though many distributed consensus algorithms have been proposed, just two dominate production systems: Paxos, the traditional, famously subtle, algorithm; and Raft, a more recent algorithm positioned as a more understandable alternative to Paxos. In this paper, we consider t… ▽ More

    Submitted 27 April, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: To be published in the 7th Workshop on Principles and Practice of Consistency for Distributed Data (PaPoC)

  20. arXiv:1902.06776  [pdf, ps, other

    cs.DC

    A Generalised Solution to Distributed Consensus

    Authors: Heidi Howard, Richard Mortier

    Abstract: Distributed consensus, the ability to reach agreement in the face of failures and asynchrony, is a fundamental primitive for constructing reliable distributed systems from unreliable components. The Paxos algorithm is synonymous with distributed consensus, yet it performs poorly in practice and is famously difficult to understand. In this paper, we re-examine the foundations of distributed consens… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

  21. arXiv:1608.06696  [pdf, other

    cs.DC

    Flexible Paxos: Quorum intersection revisited

    Authors: Heidi Howard, Dahlia Malkhi, Alexander Spiegelman

    Abstract: Distributed consensus is integral to modern distributed systems. The widely adopted Paxos algorithm uses two phases, each requiring majority agreement, to reliably reach consensus. In this paper, we demonstrate that Paxos, which lies at the foundation of many production systems, is conservative. Specifically, we observe that each of the phases of Paxos may use non-intersecting quorums. Majority qu… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.

    ACM Class: C.2.4

  22. arXiv:1501.04737  [pdf, ps, other

    cs.CY

    Personal Data: Thinking Inside the Box

    Authors: Hamed Haddadi, Heidi Howard, Amir Chaudhry, Jon Crowcroft, Anil Madhavapeddy, Richard Mortier

    Abstract: We propose there is a need for a technical platform enabling people to engage with the collection, management and consumption of personal data; and that this platform should itself be personal, under the direct control of the individual whose data it holds. In what follows, we refer to this platform as the Databox, a personal, networked service that collates personal data and can be used to make t… ▽ More

    Submitted 20 January, 2015; originally announced January 2015.