-
Everywhere & Nowhere: Envisioning a Computing Continuum for Science
Authors:
Manish Parashar
Abstract:
Emerging data-driven scientific workflows are seeking to leverage distributed data sources to understand end-to-end phenomena, drive experimentation, and facilitate important decision-making. Despite the exponential growth of available digital data sources at the edge, and the ubiquity of non trivial computational power for processing this data, realizing such science workflows remains challenging…
▽ More
Emerging data-driven scientific workflows are seeking to leverage distributed data sources to understand end-to-end phenomena, drive experimentation, and facilitate important decision-making. Despite the exponential growth of available digital data sources at the edge, and the ubiquity of non trivial computational power for processing this data, realizing such science workflows remains challenging. This paper explores a computing continuum that is everywhere and nowhere -- one spanning resources at the edges, in the core and in between, and providing abstractions that can be harnessed to support science. It also introduces recent research in programming abstractions that can express what data should be processed and when and where it should be processed, and autonomic middleware services that automate the discovery of resources and the orchestration of computations across these resources.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
High-precision chemical quantum sensing in flowing monodisperse microdroplets
Authors:
Adrisha Sarkar,
Zachary Jones,
Madhur Parashar,
Emanuel Druga,
Amala Akkiraju,
Sophie Conti,
Pranav Krishnamoorthi,
Srisai Nachuri,
Parker Aman,
Mohammad Hashemi,
Nicholas Nunn,
Marco Torelli,
Benjamin Gilbert,
Kevin R. Wilson,
Olga Shenderova,
Deepti Tanjore,
Ashok Ajoy
Abstract:
We report on a novel flow-based method for high-precision chemical detection that integrates quantum sensing with droplet microfluidics. We deploy nanodiamond particles hosting fluorescent nitrogen vacancy defects as quantum sensors in flowing, monodisperse, picoliter-volume microdroplets containing analyte molecules. ND motion within these microcompartments facilitates close sensor-analyte intera…
▽ More
We report on a novel flow-based method for high-precision chemical detection that integrates quantum sensing with droplet microfluidics. We deploy nanodiamond particles hosting fluorescent nitrogen vacancy defects as quantum sensors in flowing, monodisperse, picoliter-volume microdroplets containing analyte molecules. ND motion within these microcompartments facilitates close sensor-analyte interaction and mitigates particle heterogeneity. Microdroplet flow rates are rapid (upto 4cm/s) and with minimal drift. Pairing this controlled flow with microwave control of NV electronic spins, we introduce a new noise-suppressed mode of Optically Detected Magnetic Resonance that is sensitive to chemical analytes while resilient against experimental variations, achieving detection of analyte-induced signals at an unprecedented level of a few hundredths of a percent of the ND fluorescence. We demonstrate its application to detecting paramagnetic ions in droplets with simultaneously low limit-of-detection and low analyte volumes, in a manner significantly better than existing technologies. This is combined with exceptional measurement stability over >103s and across hundreds of thousands of droplets, while utilizing minimal sensor volumes and incurring low ND costs (<$0.70 for an hour of operation). Additionally, we demonstrate using these droplets as micro-confinement chambers by co-encapsulating ND quantum sensors with analytes, including single cells. This versatility suggests wide-ranging applications, like single-cell metabolomics and real-time intracellular measurements in bioreactors. Our work paves the way for portable, high-sensitivity, amplification-free, chemical assays with high throughput; introduces a new chemical imaging tool for probing chemical reactions in microenvironments; and establishes the foundation for develo** movable, arrayed quantum sensors through droplet microfluidics.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Local Correction of Linear Functions over the Boolean Cube
Authors:
Prashanth Amireddy,
Amik Raj Behera,
Manaswi Paraashar,
Srikanth Srinivasan,
Madhu Sudan
Abstract:
We consider the task of locally correcting, and locally list-correcting, multivariate linear functions over the domain $\{0,1\}^n$ over arbitrary fields and more generally Abelian groups. Such functions form error-correcting codes of relative distance $1/2$ and we give local-correction algorithms correcting up to nearly $1/4$-fraction errors making $\widetilde{\mathcal{O}}(\log n)$ queries. This q…
▽ More
We consider the task of locally correcting, and locally list-correcting, multivariate linear functions over the domain $\{0,1\}^n$ over arbitrary fields and more generally Abelian groups. Such functions form error-correcting codes of relative distance $1/2$ and we give local-correction algorithms correcting up to nearly $1/4$-fraction errors making $\widetilde{\mathcal{O}}(\log n)$ queries. This query complexity is optimal up to $\mathrm{poly}(\log\log n)$ factors. We also give local list-correcting algorithms correcting $(1/2 - \varepsilon)$-fraction errors with $\widetilde{\mathcal{O}}_{\varepsilon}(\log n)$ queries.
These results may be viewed as natural generalizations of the classical work of Goldreich and Levin whose work addresses the special case where the underlying group is $\mathbb{Z}_2$. By extending to the case where the underlying group is, say, the reals, we give the first non-trivial locally correctable codes (LCCs) over the reals (with query complexity being sublinear in the dimension (also known as message length)).
The central challenge in constructing the local corrector is constructing "nearly balanced vectors" over $\{-1,1\}^n$ that span $1^n$ -- we show how to construct $\mathcal{O}(\log n)$ vectors that do so, with entries in each vector summing to $\pm1$. The challenge to the local-list-correction algorithms, given the local corrector, is principally combinatorial, i.e., in proving that the number of linear functions within any Hamming ball of radius $(1/2-\varepsilon)$ is $\mathcal{O}_{\varepsilon}(1)$. Getting this general result covering every Abelian group requires integrating a variety of known methods with some new combinatorial ingredients analyzing the structural properties of codewords that lie within small Hamming balls.
△ Less
Submitted 25 April, 2024; v1 submitted 29 March, 2024;
originally announced March 2024.
-
Optimized Current Density Reconstruction from Widefield Quantum Diamond Magnetic Field Maps
Authors:
Siddhant Midha,
Madhur Parashar,
Anuj Bathla,
David A. Broadway,
Jean-Philippe Tetienne,
Kasturi Saha
Abstract:
Quantum Diamond Microscopy using Nitrogen-Vacancy (NV) defects in diamond crystals has enabled the magnetic field imaging of a wide variety of nanoscale current profiles. Intimately linked with the imaging process is the problem of reconstructing the current density, which provides critical insight into the structure under study. This manifests as a non-trivial inverse problem of current reconstru…
▽ More
Quantum Diamond Microscopy using Nitrogen-Vacancy (NV) defects in diamond crystals has enabled the magnetic field imaging of a wide variety of nanoscale current profiles. Intimately linked with the imaging process is the problem of reconstructing the current density, which provides critical insight into the structure under study. This manifests as a non-trivial inverse problem of current reconstruction from noisy data, typically conducted via Fourier-based approaches. Learning algorithms and Bayesian methods have been proposed as novel alternatives for inference-based reconstructions. We study the applicability of Fourier-based and Bayesian methods for reconstructing two-dimensional current density maps from magnetic field images obtained from NV imaging. We discuss extensive numerical simulations to elucidate the performance of the reconstruction algorithms in various parameter regimes, and further validate our analysis via performing reconstructions on experimental data. Finally, we examine parameter regimes that favor specific reconstruction algorithms and provide an empirical approach for selecting regularization in Bayesian methods.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.
-
On the communication complexity of finding a king in a tournament
Authors:
Nikhil S. Mande,
Manaswi Paraashar,
Swagato Sanyal,
Nitin Saurabh
Abstract:
A tournament is a complete directed graph. A king in a tournament is a vertex v such that every other vertex is reachable from v via a path of length at most 2. It is well known that every tournament has at least one king, one of which is a maximum out-degree vertex. The tasks of finding a king, a maximum out-degree vertex and a source in a tournament has been relatively well studied in the contex…
▽ More
A tournament is a complete directed graph. A king in a tournament is a vertex v such that every other vertex is reachable from v via a path of length at most 2. It is well known that every tournament has at least one king, one of which is a maximum out-degree vertex. The tasks of finding a king, a maximum out-degree vertex and a source in a tournament has been relatively well studied in the context of query complexity. We study the communication complexity of these tasks, where the edges are partitioned between two players. The following are our main results for n-vertex tournaments:
1) The deterministic communication complexity of finding whether a source exists is tilde{Theta}(log^2 n).
2) The deterministic and randomized communication complexities of finding a king are Theta(n). The quantum communication complexity is tilde{Theta}(sqrt{n}).
3) The deterministic, randomized and quantum communication complexities of finding a maximum out-degree vertex are Theta(n log n), tilde{Theta}(n) and tilde{Theta}(sqrt{n}), respectively.
Our upper bounds hold for all partitions of edges, and the lower bounds for a specific partition of the edges. To show the first bullet above, we show, perhaps surprisingly, that finding a source in a tournament is equivalent to the well-studied Clique vs. Independent Set (CIS) problem on undirected graphs. Our bounds for finding a source then follow from known bounds on the complexity of the CIS problem. In view of this equivalence, we can view the task of finding a king in a tournament to be a natural generalization of CIS.
One of our lower bounds uses a fooling-set based argument, and all our other lower bounds follow from carefully-constructed reductions from Set-Disjointness.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
XaaS: Acceleration as a Service to Enable Productive High-Performance Cloud Computing
Authors:
Torsten Hoefler,
Marcin Copik,
Pete Beckman,
Andrew Jones,
Ian Foster,
Manish Parashar,
Daniel Reed,
Matthias Troyer,
Thomas Schulthess,
Dan Ernst,
Jack Dongarra
Abstract:
HPC and Cloud have evolved independently, specializing their innovations into performance or productivity. Acceleration as a Service (XaaS) is a recipe to empower both fields with a shared execution platform that provides transparent access to computing resources, regardless of the underlying cloud or HPC service provider. Bridging HPC and cloud advancements, XaaS presents a unified architecture b…
▽ More
HPC and Cloud have evolved independently, specializing their innovations into performance or productivity. Acceleration as a Service (XaaS) is a recipe to empower both fields with a shared execution platform that provides transparent access to computing resources, regardless of the underlying cloud or HPC service provider. Bridging HPC and cloud advancements, XaaS presents a unified architecture built on performance-portable containers. Our converged model concentrates on low-overhead, high-performance communication and computing, targeting resource-intensive workloads from climate simulations to machine learning. XaaS lifts the restricted allocation model of Function-as-a-Service (FaaS), allowing users to benefit from the flexibility and efficient resource utilization of serverless while supporting long-running and performance-sensitive workloads from HPC.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Linear isomorphism testing of Boolean functions with small approximate spectral norm
Authors:
Arijit Ghosh,
Chandrima Kayal,
Manaswi Paraashar,
Manmatha Roy
Abstract:
Two Boolean functions f, g : F_2^{n} \to {-1, 1} are called linearly isomorphic if there exists an invertible matrix M \in F_2^{n\times n} such that f\circ M = g. Testing linear isomorphism is a generalization of, now classical in the context of property testing, isomorphism testing between Boolean functions. Linear-invariance of Boolean functions has also been extensively studied in other areas l…
▽ More
Two Boolean functions f, g : F_2^{n} \to {-1, 1} are called linearly isomorphic if there exists an invertible matrix M \in F_2^{n\times n} such that f\circ M = g. Testing linear isomorphism is a generalization of, now classical in the context of property testing, isomorphism testing between Boolean functions. Linear-invariance of Boolean functions has also been extensively studied in other areas like coding theory and cryptography, and mathematics in general. In this paper, we will study the following two variants of this problem:
[1] [Communication complexity: ] Assume that Boolean functions f and g on F_2^{n} are given to Alice and Bob respectively, and the goal is to test linear isomorphism between f and g by exchanging a minimum amount of communication, measured in bits, between Alice and Bob. Our main result is an efficient two-party communication protocol for testing linear isomorphism in terms of the approximate spectral norm of the functions. We will crucially exploit the connection between approximate spectral norm and sign-approximating polynomials.
[2] [Query complexity: ] If f: F_2^{n} \to { -1, 1 } is a known function and g : F_2^{n} \to { -1, 1 } be an unknown function with a query access. We study the query complexity of testing linear isomorphism between f and g in terms of the approximate spectral norm of f. As in the case of communication complexity, we will use properties of the approximate spectral norm.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Randomized and quantum query complexities of finding a king in a tournament
Authors:
Nikhil S. Mande,
Manaswi Paraashar,
Nitin Saurabh
Abstract:
A tournament is a complete directed graph. It is well known that every tournament contains at least one vertex v such that every other vertex is reachable from v by a path of length at most 2. All such vertices v are called *kings* of the underlying tournament. Despite active recent research in the area, the best-known upper and lower bounds on the deterministic query complexity (with query access…
▽ More
A tournament is a complete directed graph. It is well known that every tournament contains at least one vertex v such that every other vertex is reachable from v by a path of length at most 2. All such vertices v are called *kings* of the underlying tournament. Despite active recent research in the area, the best-known upper and lower bounds on the deterministic query complexity (with query access to directions of edges) of finding a king in a tournament on n vertices are from over 20 years ago, and the bounds do not match: the best-known lower bound is Omega(n^{4/3}) and the best-known upper bound is O(n^{3/2}) [Shen, Sheng, Wu, SICOMP'03]. Our contribution is to show essentially *tight* bounds (up to logarithmic factors) of Theta(n) and Theta(sqrt{n}) in the *randomized* and *quantum* query models, respectively. We also study the randomized and quantum query complexities of finding a maximum out-degree vertex in a tournament.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
On the Composition of Randomized Query Complexity and Approximate Degree
Authors:
Sourav Chakraborty,
Chandrima Kayal,
Rajat Mittal,
Manaswi Paraashar,
Swagato Sanyal,
Nitin Saurabh
Abstract:
For any Boolean functions $f$ and $g$, the question whether $R(f\circ g) = \tildeΘ(R(f)R(g))$, is known as the composition question for the randomized query complexity. Similarly, the composition question for the approximate degree asks whether $\widetilde{deg}(f\circ g) = \tildeΘ(\widetilde{deg}(f)\cdot\widetilde{deg}(g))$. These questions are two of the most important and well-studied problems,…
▽ More
For any Boolean functions $f$ and $g$, the question whether $R(f\circ g) = \tildeΘ(R(f)R(g))$, is known as the composition question for the randomized query complexity. Similarly, the composition question for the approximate degree asks whether $\widetilde{deg}(f\circ g) = \tildeΘ(\widetilde{deg}(f)\cdot\widetilde{deg}(g))$. These questions are two of the most important and well-studied problems, and yet we are far from answering them satisfactorily.
It is known that the measures compose if one assumes various properties of the outer function $f$ (or inner function $g$). This paper extends the class of outer functions for which $\text{R}$ and $\widetilde{\text{deg}}$ compose.
A recent landmark result (Ben-David and Blais, 2020) showed that $R(f \circ g) = Ω(noisyR(f)\cdot R(g))$. This implies that composition holds whenever $noisyR(f) = \TildeΘ(R(f))$. We show two results:
(1)When $R(f) = Θ(n)$, then $noisyR(f) = Θ(R(f))$.
(2) If $\text{R}$ composes with respect to an outer function, then $\text{noisyR}$ also composes with respect to the same outer function. On the other hand, no result of the type $\widetilde{deg}(f \circ g) = Ω(M(f) \cdot \widetilde{deg}(g))$ (for some non-trivial complexity measure $M(\cdot)$) was known to the best of our knowledge. We prove that
$\widetilde{deg}(f\circ g) = \widetildeΩ(\sqrt{bs(f)} \cdot \widetilde{deg}(g)),$
where $bs(f)$ is the block sensitivity of $f$. This implies that $\widetilde{\text{deg}}$ composes when $\widetilde{\text{deg}}(f)$ is asymptotically equal to $\sqrt{\text{bs}(f)}$.
It is already known that both $\text{R}$ and $\widetilde{\text{deg}}$ compose when the outer function is symmetric. We also extend these results to weaker notions of symmetry with respect to the outer function.
△ Less
Submitted 11 July, 2023; v1 submitted 8 July, 2023;
originally announced July 2023.
-
Workflows Community Summit 2022: A Roadmap Revolution
Authors:
Rafael Ferreira da Silva,
Rosa M. Badia,
Venkat Bala,
Debbie Bard,
Peer-Timo Bremer,
Ian Buckley,
Silvina Caino-Lores,
Kyle Chard,
Carole Goble,
Shantenu Jha,
Daniel S. Katz,
Daniel Laney,
Manish Parashar,
Frederic Suter,
Nick Tyler,
Thomas Uram,
Ilkay Altintas,
Stefan Andersson,
William Arndt,
Juan Aznar,
Jonathan Bader,
Bartosz Balis,
Chris Blanton,
Kelly Rosa Braghetto,
Aharon Brodutch
, et al. (80 additional authors not shown)
Abstract:
Scientific workflows have become integral tools in broad scientific computing use cases. Science discovery is increasingly dependent on workflows to orchestrate large and complex scientific experiments that range from execution of a cloud-based data preprocessing pipeline to multi-facility instrument-to-edge-to-HPC computational workflows. Given the changing landscape of scientific computing and t…
▽ More
Scientific workflows have become integral tools in broad scientific computing use cases. Science discovery is increasingly dependent on workflows to orchestrate large and complex scientific experiments that range from execution of a cloud-based data preprocessing pipeline to multi-facility instrument-to-edge-to-HPC computational workflows. Given the changing landscape of scientific computing and the evolving needs of emerging scientific applications, it is paramount that the development of novel scientific workflows and system functionalities seek to increase the efficiency, resilience, and pervasiveness of existing systems and applications. Specifically, the proliferation of machine learning/artificial intelligence (ML/AI) workflows, need for processing large scale datasets produced by instruments at the edge, intensification of near real-time data processing, support for long-term experiment campaigns, and emergence of quantum computing as an adjunct to HPC, have significantly changed the functional and operational requirements of workflow systems. Workflow systems now need to, for example, support data streams from the edge-to-cloud-to-HPC enable the management of many small-sized files, allow data reduction while ensuring high accuracy, orchestrate distributed services (workflows, instruments, data movement, provenance, publication, etc.) across computing and user facilities, among others. Further, to accelerate science, it is also necessary that these systems implement specifications/standards and APIs for seamless (horizontal and vertical) integration between systems and applications, as well as enabling the publication of workflows and their associated products according to the FAIR principles. This document reports on discussions and findings from the 2022 international edition of the Workflows Community Summit that took place on November 29 and 30, 2022.
△ Less
Submitted 31 March, 2023;
originally announced April 2023.
-
Map** AC Susceptibility with Quantum Diamond Microscope
Authors:
Shishir Dasika,
Madhur Parashar,
Kasturi Saha
Abstract:
We present a novel technique for determining the microscale AC susceptibility of magnetic materials. We use magnetic field sensing properties of nitrogen-vacancy (\ce{NV-}) centers in diamond to gather quantitative data about the magnetic state of the magnetic material under investigation. In order to achieve the requisite speed in imaging, a lock-in camera is used to perform pixel-by-pixel lock-i…
▽ More
We present a novel technique for determining the microscale AC susceptibility of magnetic materials. We use magnetic field sensing properties of nitrogen-vacancy (\ce{NV-}) centers in diamond to gather quantitative data about the magnetic state of the magnetic material under investigation. In order to achieve the requisite speed in imaging, a lock-in camera is used to perform pixel-by-pixel lock-in detection of \ce{NV-} photo-luminescence. In addition, a secondary sensor is employed to isolate the effect of the excitation field from fields arising from magnetic structures on \ce{NV-} centers. We demonstrate our experimental technique by measuring the AC susceptibility of soft permalloy micro-magnets at excitation frequencies of up to \SI{20}{\hertz} with a spatial resolution of \SI{1.2}{\micro \meter} and a field of view of \SI{100}{\um}. Our work paves the way for microscopic measurement of AC susceptibilities of magnetic materials relevant to physical, biological, and material sciences.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
Toward Democratizing Access to Facilities Data: A Framework for Intelligent Data Discovery and Delivery
Authors:
Yubo Qin,
Ivan Rodero,
Manish Parashar
Abstract:
Data collected by large-scale instruments, observatories, and sensor networks are key enablers of scientific discoveries in many disciplines. However, ensuring that these data can be accessed, integrated, and analyzed in a democratized and timely manner remains a challenge. In this article, we explore how state-of-the-art techniques for data discovery and access can be adapted to facility data and…
▽ More
Data collected by large-scale instruments, observatories, and sensor networks are key enablers of scientific discoveries in many disciplines. However, ensuring that these data can be accessed, integrated, and analyzed in a democratized and timely manner remains a challenge. In this article, we explore how state-of-the-art techniques for data discovery and access can be adapted to facility data and develop a conceptual framework for intelligent data access and discovery.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Exploring the Role of Machine Learning in Scientific Workflows: Opportunities and Challenges
Authors:
Azita Nouri,
Philip E. Davis,
Pradeep Subedi,
Manish Parashar
Abstract:
In this survey, we discuss the challenges of executing scientific workflows as well as existing Machine Learning (ML) techniques to alleviate those challenges. We provide the context and motivation for applying ML to each step of the execution of these workflows. Furthermore, we provide recommendations on how to extend ML techniques to unresolved challenges in the execution of scientific workflows…
▽ More
In this survey, we discuss the challenges of executing scientific workflows as well as existing Machine Learning (ML) techniques to alleviate those challenges. We provide the context and motivation for applying ML to each step of the execution of these workflows. Furthermore, we provide recommendations on how to extend ML techniques to unresolved challenges in the execution of scientific workflows. Moreover, we discuss the possibility of using ML techniques for in-situ operations. We explore the challenges of in-situ workflows and provide suggestions for improving the performance of their execution using ML techniques.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
Scalable Graph Embedding LearningOn A Single GPU
Authors:
Azita Nouri,
Philip E. Davis,
Pradeep Subedi,
Manish Parashar
Abstract:
Graph embedding techniques have attracted growing interest since they convert the graph data into continuous and low-dimensional space. Effective graph analytic provides users a deeper understanding of what is behind the data and thus can benefit a variety of machine learning tasks. With the current scale of real-world applications, most graph analytic methods suffer high computation and space cos…
▽ More
Graph embedding techniques have attracted growing interest since they convert the graph data into continuous and low-dimensional space. Effective graph analytic provides users a deeper understanding of what is behind the data and thus can benefit a variety of machine learning tasks. With the current scale of real-world applications, most graph analytic methods suffer high computation and space costs. These methods and systems can process a network with thousands to a few million nodes. However, scaling to large-scale networks remains a challenge. The complexity of training graph embedding system requires the use of existing accelerators such as GPU. In this paper, we introduce a hybrid CPU-GPU framework that addresses the challenges of learning embedding of large-scale graphs. The performance of our method is compared qualitatively and quantitatively with the existing embedding systems on common benchmarks. We also show that our system can scale training to datasets with an order of magnitude greater than a single machine's total memory capacity. The effectiveness of the learned embedding is evaluated within multiple downstream applications. The experimental results indicate the effectiveness of the learned embedding in terms of performance and accuracy.
△ Less
Submitted 19 January, 2022; v1 submitted 13 October, 2021;
originally announced October 2021.
-
Sub-second Temporal Magnetic Field Microscopy Using Quantum Defects in Diamond
Authors:
Madhur Parashar,
Anuj Bathla,
Dasika Shishir,
Alok Gokhale,
Sharba Bandyopadhyay,
Kasturi Saha
Abstract:
Wide field-of-view magnetic field microscopy has been realised by probing shifts in optically detected magnetic resonance (ODMR) spectrum of Nitrogen Vacancy (NV) defect centers in diamond. However, these widefield diamond NV magnetometers require few to several minutes of acquisition to get a single magnetic field image, rendering the technique temporally static in it's current form. This limitat…
▽ More
Wide field-of-view magnetic field microscopy has been realised by probing shifts in optically detected magnetic resonance (ODMR) spectrum of Nitrogen Vacancy (NV) defect centers in diamond. However, these widefield diamond NV magnetometers require few to several minutes of acquisition to get a single magnetic field image, rendering the technique temporally static in it's current form. This limitation prevents application of diamond NV magnetometers to novel imaging of dynamically varying microscale magnetic field processes. Here, we show that the magnetic field imaging frame rate can be significantly enhanced by performing lock-in detection of NV photo-luminescence (PL), simultaneously over multiple pixels of a lock-in camera. A detailed protocol for synchronization of frequency modulated PL of NV centers with fast camera frame demodulation, at few kilohertz frequencies, has been experimentally demonstrated. This experimental technique allows magnetic field imaging of sub-second varying microscale currents in planar microcoils with imaging frame rates in the range of 50 to 200 frames per second (fps). Our work demonstrates that widefield per-pixel lock-in detection of frequency modulated NV ODMR enables dynamic magnetic field microscopy.
△ Less
Submitted 25 February, 2022; v1 submitted 26 July, 2021;
originally announced July 2021.
-
Separations between Combinatorial Measures for Transitive Functions
Authors:
Sourav Chakraborty,
Chandrima Kayal,
Manaswi Paraashar
Abstract:
The role of symmetry in Boolean functions $f:\{0,1\}^n \to \{0,1\}$ has been extensively studied in complexity theory. For example, symmetric functions, that is, functions that are invariant under the action of $S_n$, is an important class of functions in the study of Boolean functions. A function $f:\{0,1\}^n \to \{0,1\}$ is called transitive (or weakly-symmetric) if there exists a transitive gro…
▽ More
The role of symmetry in Boolean functions $f:\{0,1\}^n \to \{0,1\}$ has been extensively studied in complexity theory. For example, symmetric functions, that is, functions that are invariant under the action of $S_n$, is an important class of functions in the study of Boolean functions. A function $f:\{0,1\}^n \to \{0,1\}$ is called transitive (or weakly-symmetric) if there exists a transitive group $G$ of $S_n$ such that $f$ is invariant under the action of $G$ - that is the function value remains unchanged even after the bits of the input of $f$ are moved around according to some permutation $σ\in G$. Understanding various complexity measures of transitive functions has been a rich area of research for the past few decades.
In this work, we study transitive functions in light of several combinatorial measures. We look at the maximum separation between various pairs of measures for transitive functions. Such study for general Boolean functions has been going on for past many years. The best-known results for general Boolean functions have been nicely compiled by Aaronson et. al (STOC, 2021).
The separation between a pair of combinatorial measures is shown by constructing interesting functions that demonstrate the separation. But many of the celebrated separation results are via the construction of functions (like "pointer functions" from Ambainis et al. (JACM, 2017) and "cheat-sheet functions" Aaronson et al. (STOC, 2016)) that are not transitive. Hence, we don't have such separation between the pairs of measures for transitive functions.
In this paper we show how to modify some of these functions to construct transitive functions that demonstrate similar separations between pairs of combinatorial measures.
△ Less
Submitted 29 March, 2023; v1 submitted 23 March, 2021;
originally announced March 2021.
-
Leveraging User Access Patterns and Advanced Cyberinfrastructure to Accelerate Data Delivery from Shared-use Scientific Observatories
Authors:
Yubo Qin,
Ivan Rodero,
Anthony Simonet,
Charles Meertens,
Daniel Reiner,
James Riley,
Manish Parashar
Abstract:
With the growing number and increasing availability of shared-use instruments and observatories, observational data is becoming an essential part of application workflows and contributor to scientific discoveries in a range of disciplines. However, the corresponding growth in the number of users accessing these facilities coupled with the expansion in the scale and variety of the data, is making i…
▽ More
With the growing number and increasing availability of shared-use instruments and observatories, observational data is becoming an essential part of application workflows and contributor to scientific discoveries in a range of disciplines. However, the corresponding growth in the number of users accessing these facilities coupled with the expansion in the scale and variety of the data, is making it challenging for these facilities to ensure their data can be accessed, integrated, and analyzed in a timely manner, and is resulting significant demands on their cyberinfrastructure (CI).
In this paper, we present the design of a push-based data delivery framework that leverages emerging in-network capabilities, along with data pre-fetching techniques based on a hybrid data management model. Specifically, we analyze data access traces for two large-scale observatories, Ocean Observatories Initiative (OOI) and Geodetic Facility for the Advancement of Geoscience (GAGE), to identify typical user access patterns and to develop a model that can be used for data pre-fetching. Furthermore, we evaluate our data pre-fetching model and the proposed framework using a simulation of the Virtual Data Collaboratory (VDC) platform that provides in-network data staging and processing capabilities. The results demonstrate that the ability of the framework to significantly improve data delivery performance and reduce network traffic at the observatories' facilities.
△ Less
Submitted 30 December, 2020;
originally announced December 2020.
-
The Role of Symmetry in Quantum Query-to-Communication Simulation
Authors:
Sourav Chakraborty,
Arkadev Chattopadhyay,
Peter Høyer,
Nikhil S. Mande,
Manaswi Paraashar,
Ronald de Wolf
Abstract:
Buhrman, Cleve and Wigderson (STOC'98) showed that for every Boolean function f : {-1,1}^n to {-1,1} and G in {AND_2, XOR_2}, the bounded-error quantum communication complexity of the composed function f o G equals O(Q(f) log n), where Q(f) denotes the bounded-error quantum query complexity of f. This is achieved by Alice running the optimal quantum query algorithm for f, using a round of O(log n)…
▽ More
Buhrman, Cleve and Wigderson (STOC'98) showed that for every Boolean function f : {-1,1}^n to {-1,1} and G in {AND_2, XOR_2}, the bounded-error quantum communication complexity of the composed function f o G equals O(Q(f) log n), where Q(f) denotes the bounded-error quantum query complexity of f. This is achieved by Alice running the optimal quantum query algorithm for f, using a round of O(log n) qubits of communication to implement each query.
This is in contrast with the classical setting, where it is easy to show that R^{cc}(f o G) is at most 2R(f), where R^{cc} and R denote bounded-error communication and query complexity, respectively. We show that the O(log n) overhead is required for some functions in the quantum setting, and thus the BCW simulation is tight. We note here that prior to our work, the possibility of Q^{cc}(f o G) = O(Q(f)), for all f and all G in {AND_2, XOR_2}, had not been ruled out. More specifically, we show the following.
- We show that the log n overhead is *not* required when f is symmetric, generalizing a result of Aaronson and Ambainis for the Set-Disjointness function (Theory of Computing'05).
- In order to prove the above, we design an efficient distributed version of noisy amplitude amplification that allows us to prove the result when f is the OR function.
- In view of our first result above, one may ask whether the log n overhead in the BCW simulation can be avoided even when f is transitive, which is a weaker notion of symmetry. We give a strong negative answer by showing that the log n overhead is still necessary for some transitive functions even when we allow the quantum communication protocol an error probability that can be arbitrarily close to 1/2.
- We also give, among other things, a general recipe to construct functions for which the log n overhead is required in the BCW simulation in the bounded-error communication model.
△ Less
Submitted 25 April, 2023; v1 submitted 9 December, 2020;
originally announced December 2020.
-
Tight Chang's-lemma-type bounds for Boolean functions
Authors:
Sourav Chakraborty,
Nikhil S. Mande,
Rajat Mittal,
Tulasimohan Molli,
Manaswi Paraashar,
Swagato Sanyal
Abstract:
Chang's lemma (Duke Mathematical Journal, 2002) is a classical result with applications across several areas in mathematics and computer science. For a Boolean function $f$ that takes values in {-1,1} let $r(f)$ denote its Fourier rank. For each positive threshold $t$, Chang's lemma provides a lower bound on $wt(f):=\Pr[f(x)=-1]$ in terms of the dimension of the span of its characters with Fourier…
▽ More
Chang's lemma (Duke Mathematical Journal, 2002) is a classical result with applications across several areas in mathematics and computer science. For a Boolean function $f$ that takes values in {-1,1} let $r(f)$ denote its Fourier rank. For each positive threshold $t$, Chang's lemma provides a lower bound on $wt(f):=\Pr[f(x)=-1]$ in terms of the dimension of the span of its characters with Fourier coefficients of magnitude at least $1/t$. We examine the tightness of Chang's lemma w.r.t. the following three natural settings of the threshold:
- the Fourier sparsity of $f$, denoted $k(f)$,
- the Fourier max-supp-entropy of $f$, denoted $k'(f)$, defined to be $\max \{1/|\hat{f}(S)| : \hat{f}(S) \neq 0\}$,
- the Fourier max-rank-entropy of $f$, denoted $k''(f)$, defined to be the minimum $t$ such that characters whose Fourier coefficients are at least $1/t$ in absolute value span a space of dimension $r(f)$.
We prove new lower bounds on $wt(f)$ in terms of these measures. One of our lower bounds subsumes and refines the previously best known upper bound on $r(f)$ in terms of $k(f)$ by Sanyal (ToC, 2019). Another lower bound is based on our improvement of a bound by Chattopadhyay, Hatami, Lovett and Tal (ITCS, 2019) on the sum of the absolute values of the level-$1$ Fourier coefficients. We also show that Chang's lemma for the these choices of the threshold is asymptotically outperformed by our bounds for most settings of the parameters involved.
Next, we show that our bounds are tight for a wide range of the parameters involved, by constructing functions (which are modifications of the Addressing function) witnessing their tightness. Finally we construct Boolean functions $f$ for which
- our lower bounds asymptotically match $wt(f)$, and
- for any choice of the threshold $t$, the lower bound obtained from Chang's lemma is asymptotically smaller than $wt(f)$.
△ Less
Submitted 22 May, 2021; v1 submitted 3 December, 2020;
originally announced December 2020.
-
Query Complexity of Global Minimum Cut
Authors:
Arijit Bishnu,
Arijit Ghosh,
Gopinath Mishra,
Manaswi Paraashar
Abstract:
In this work, we resolve the query complexity of global minimum cut problem for a graph by designing a randomized algorithm for approximating the size of minimum cut in a graph, where the graph can be accessed through local queries like {\sc Degree}, {\sc Neighbor}, and {\sc Adjacency} queries.
Given $ε\in (0,1)$, the algorithm with high probability outputs an estimate $\hat{t}$ satisfying the f…
▽ More
In this work, we resolve the query complexity of global minimum cut problem for a graph by designing a randomized algorithm for approximating the size of minimum cut in a graph, where the graph can be accessed through local queries like {\sc Degree}, {\sc Neighbor}, and {\sc Adjacency} queries.
Given $ε\in (0,1)$, the algorithm with high probability outputs an estimate $\hat{t}$ satisfying the following $(1-ε) t \leq \hat{t} \leq (1+ε) t$, where $m$ is the number of edges in the graph and $t$ is the size of minimum cut in the graph. The expected number of local queries used by our algorithm is $\min\left\{m+n,\frac{m}{t}\right\}\mbox{poly}\left(\log n,\frac{1}ε\right)$ where $n$ is the number of vertices in the graph. Eden and Rosenbaum showed that $Ω(m/t)$ many local queries are required for approximating the size of minimum cut in graphs. These two results together resolve the query complexity of the problem of estimating the size of minimum cut in graphs using local queries.
Building on the lower bound of Eden and Rosenbaum, we show that, for all $t \in \mathbb{N}$, $Ω(m)$ local queries are required to decide if the size of the minimum cut in the graph is $t$ or $t-2$. Also, we show that, for any $t \in \mathbb{N}$, $Ω(m)$ local queries are required to find all the minimum cut edges even if it is promised that the input graph has a minimum cut of size $t$. Both of our lower bound results are randomized, and hold even if we can make {\sc Random Edge} query apart from local queries.
△ Less
Submitted 11 August, 2020; v1 submitted 17 July, 2020;
originally announced July 2020.
-
Disjointness through the Lens of Vapnik-Chervonenkis Dimension: Sparsity and Beyond
Authors:
Anup Bhattacharya,
Sourav Chakraborty,
Arijit Ghosh,
Gopinath Mishra,
Manaswi Paraashar
Abstract:
The disjointness problem - where Alice and Bob are given two subsets of $\{1, \dots, n\}$ and they have to check if their sets intersect - is a central problem in the world of communication complexity. While both deterministic and randomized communication complexities for this problem are known to be $Θ(n)$, it is also known that if the sets are assumed to be drawn from some restricted set systems…
▽ More
The disjointness problem - where Alice and Bob are given two subsets of $\{1, \dots, n\}$ and they have to check if their sets intersect - is a central problem in the world of communication complexity. While both deterministic and randomized communication complexities for this problem are known to be $Θ(n)$, it is also known that if the sets are assumed to be drawn from some restricted set systems then the communication complexity can be much lower. In this work, we explore how communication complexity measures change with respect to the complexity of the underlying set system. The complexity measure for the set system that we use in this work is the Vapnik-Chervonenkis (VC) dimension. More precisely, on any set system with VC dimension bounded by $d$, we analyze how large can the deterministic and randomized communication complexities be, as a function of $d$ and $n$.
In this paper, we construct two natural set systems of VC dimension $d$, motivated from geometry. Using these set systems we show that the deterministic and randomized communication complexity can be $\widetildeΘ\left(d\log \left( n/d \right)\right)$ for set systems of VC dimension $d$ and this matches the deterministic upper bound for all set systems of VC dimension $d$. We also study the deterministic and randomized communication complexities of the set intersection problem when sets belong to a set system of bounded VC dimension. We show that there exists set systems of VC dimension $d$ such that both deterministic and randomized (one-way and multi-round) complexity for the set intersection problem can be as high as $Θ\left( d\log \left( n/d \right) \right)$, and this is tight among all set systems of VC dimension $d$.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Axon Hillock Currents Allow Single-Neuron-Resolution 3-Dimensional Functional Neural Imaging Using Diamond Quantum Defect-Based Vector Magnetometry
Authors:
Madhur Parashar,
Kasturi Saha,
Sharba Bandyopadhyay
Abstract:
Magnetic field sensing, with its recent advances, is emerging as a viable alternative to measure functional activity of single neurons in the brain by sensing action potential associated magnetic fields (APMFs). Measurement of APMFs of large axons of worms have been possible due to their size. In the mammalian brain, axon sizes, their numbers and routes, restricts using such functional imaging met…
▽ More
Magnetic field sensing, with its recent advances, is emerging as a viable alternative to measure functional activity of single neurons in the brain by sensing action potential associated magnetic fields (APMFs). Measurement of APMFs of large axons of worms have been possible due to their size. In the mammalian brain, axon sizes, their numbers and routes, restricts using such functional imaging methods. With segmented model of mammalian pyramidal neurons, we show that the APMF of intra-axonal currents in the axon hillock are two orders of magnitude larger than other neuronal locations. Expected 2-dimensional vector magnetic field maps of naturalistic spiking activity of a volume of neurons via widefield diamond-nitrogen-vacancy-center-magnetometry (DNVM) were simulated. A dictionary based matching pursuit type algorithm applied to the data using the axon-hillock's APMF signature allowed spatiotemporal reconstruction of APs in the volume of brain tissue at single cell resolution. Enhancement of APMF signals coupled with NVMM advances thus can potentially replace current functional brain map** techniques.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Exploring Trade-offs in Dynamic Task Triggering for Loosely Coupled Scientific Workflows
Authors:
Zhe Wang,
Pradeep Subedi,
Shaohua Duan,
Yubo Qin,
Philip Davis,
Anthony Simonet,
Ivan Rodero,
Manish Parashar
Abstract:
In order to achieve near-time insights, scientific workflows tend to be organized in a flexible and dynamic way. Data-driven triggering of tasks has been explored as a way to support workflows that evolve based on the data. However, the overhead introduced by such dynamic triggering of tasks is an under-studied topic. This paper discusses different facets of dynamic task triggers. Particularly, we…
▽ More
In order to achieve near-time insights, scientific workflows tend to be organized in a flexible and dynamic way. Data-driven triggering of tasks has been explored as a way to support workflows that evolve based on the data. However, the overhead introduced by such dynamic triggering of tasks is an under-studied topic. This paper discusses different facets of dynamic task triggers. Particularly, we explore different ways of constructing a data-driven dynamic workflow and then evaluate the overheads introduced by such design decisions. We evaluate workflows with varying data size, percentage of interesting data, temporal data distribution, and number of tasks triggered. Finally, we provide advice based upon analysis of the evaluation results for users looking to construct data-driven scientific workflows.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Challenges in designing edge-based middlewares for the Internet of Things: A survey
Authors:
Eduard Gibert Renart,
Daniel Balouek-thomert,
Manish Parashar
Abstract:
The Internet of Things paradigm connects edge devices via the Internet enabling them to be seamlessly integrated with a wide variety of applications. In recent years, the number of connected devices has grown significantly, along with the volume and variety of data that is being generated by these devices at the edge of the network. An edge-based middleware is defined as a software that serves as…
▽ More
The Internet of Things paradigm connects edge devices via the Internet enabling them to be seamlessly integrated with a wide variety of applications. In recent years, the number of connected devices has grown significantly, along with the volume and variety of data that is being generated by these devices at the edge of the network. An edge-based middleware is defined as a software that serves as an interface between the computational resources and the IoT devices, making communication possible among elements. Such middleware is required to provide the necessary functional components for sensor registration, discovery, workflow composition, and data pre-processing. In recent years, the landscape of the edge middleware platforms has grown exponentially, each of them with different platform requirements, architectures, and features. The core of this survey is a comprehensive review of existing edge middleware solutions. In this regard, we propose a four-layer architecture for the design of edge-based middleware, along with some design goals for each of the proposed layer. The paper concludes with some open challenges and possible future research directions.
△ Less
Submitted 13 December, 2019;
originally announced December 2019.
-
Quantum Query-to-Communication Simulation Needs a Logarithmic Overhead
Authors:
Sourav Chakraborty,
Arkadev Chattopadhyay,
Nikhil S. Mande,
Manaswi Paraashar
Abstract:
Buhrman, Cleve and Wigderson (STOC'98) observed that for every Boolean function $f : \{-1, 1\}^n \to \{-1, 1\}$ and $\bullet : \{-1, 1\}^2 \to \{-1, 1\}$ the two-party bounded-error quantum communication complexity of $(f \circ \bullet)$ is $O(Q(f) \log n)$, where $Q(f)$ is the bounded-error quantum query complexity of $f$. Note that the bounded-error randomized communication complexity of…
▽ More
Buhrman, Cleve and Wigderson (STOC'98) observed that for every Boolean function $f : \{-1, 1\}^n \to \{-1, 1\}$ and $\bullet : \{-1, 1\}^2 \to \{-1, 1\}$ the two-party bounded-error quantum communication complexity of $(f \circ \bullet)$ is $O(Q(f) \log n)$, where $Q(f)$ is the bounded-error quantum query complexity of $f$. Note that the bounded-error randomized communication complexity of $(f \circ \bullet)$ is bounded by $O(R(f))$, where $R(f)$ denotes the bounded-error randomized query complexity of $f$. Thus, the BCW simulation has an extra $O(\log n)$ factor appearing that is absent in classical simulation. A natural question is if this factor can be avoided. Høyer and de Wolf (STACS'02) showed that for the Set-Disjointness function, this can be reduced to $c^{\log^* n}$ for some constant $c$, and subsequently Aaronson and Ambainis (FOCS'03) showed that this factor can be made a constant. That is, the quantum communication complexity of the Set-Disjointness function (which is $\mathsf{NOR}_n \circ \wedge$) is $O(Q(\mathsf{NOR}_n))$.
Perhaps somewhat surprisingly, we show that when $ \bullet = \oplus$, then the extra $\log n$ factor in the BCW simulation is unavoidable. In other words, we exhibit a total function $F : \{-1, 1\}^n \to \{-1, 1\}$ such that $Q^{cc}(F \circ \oplus) = Θ(Q(F) \log n)$.
To the best of our knowledge, it was not even known prior to this work whether there existed a total function $F$ and 2-bit function $\bullet$, such that $Q^{cc}(F \circ \bullet) = ω(Q(F))$.
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
Efficiently Sampling and Estimating from Substructures using Linear Algebraic Queries
Authors:
Arijit Bishnu,
Arijit Ghosh,
Gopinath Mishra,
Manaswi Paraashar
Abstract:
Given an unknown $n \times n$ matrix $A$ having non-negative entries, the \emph{inner product} (IP) oracle takes as inputs a specified row (or a column) of $A$ and a vector $v \in \mathbb{R}^{n}$, and returns their inner product. A derivative of IP is the induced degree query in an unknown graph $G=(V(G), E(G))$ that takes a vertex $u \in V(G)$ and a subset $S \subseteq V(G)$ as input and reports…
▽ More
Given an unknown $n \times n$ matrix $A$ having non-negative entries, the \emph{inner product} (IP) oracle takes as inputs a specified row (or a column) of $A$ and a vector $v \in \mathbb{R}^{n}$, and returns their inner product. A derivative of IP is the induced degree query in an unknown graph $G=(V(G), E(G))$ that takes a vertex $u \in V(G)$ and a subset $S \subseteq V(G)$ as input and reports the number of neighbors of $u$ that are present in $S$. The goal of this paper is to understand the strength of the inner product oracle. Our results in that direction are as follows: (I) IP oracle can solve bilinear form estimation, i.e., estimate the value of ${\bf x}^{T}A\bf{y}$ given two vectors ${\bf x},\, {\bf y} \in \mathbb{R}^{n}$ with non-negative entries and can sample almost uniformly entries of a matrix with non-negative entries; (ii) We tackle for the first time weighted edge estimation and weighted sampling of edges that follow as an application to the bilinear form estimation and almost uniform sampling problems, respectively; (iii) induced degree query, a derivative of IP can solve edge estimation and an almost uniform edge sampling in induced subgraphs. To the best of our knowledge, these are the first set of Oracle-based query complexity results for induced subgraphs. We show that IP/induced degree queries over the whole graph can simulate local queries in any induced subgraph; (iv) Apart from the above, we also show that IP can solve several problems related to matrix, like testing if the matrix is diagonal, symmetric, doubly stochastic, etc.
△ Less
Submitted 18 February, 2022; v1 submitted 18 June, 2019;
originally announced June 2019.
-
Two new results about quantum exact learning
Authors:
Srinivasan Arunachalam,
Sourav Chakraborty,
Troy Lee,
Manaswi Paraashar,
Ronald de Wolf
Abstract:
We present two new results about exact learning by quantum computers. First, we show how to exactly learn a $k$-Fourier-sparse $n$-bit Boolean function from $O(k^{1.5}(\log k)^2)$ uniform quantum examples for that function. This improves over the bound of $\widetildeΘ(kn)$ uniformly random \emph{classical} examples (Haviv and Regev, CCC'15). Additionally, we provide a possible direction to improve…
▽ More
We present two new results about exact learning by quantum computers. First, we show how to exactly learn a $k$-Fourier-sparse $n$-bit Boolean function from $O(k^{1.5}(\log k)^2)$ uniform quantum examples for that function. This improves over the bound of $\widetildeΘ(kn)$ uniformly random \emph{classical} examples (Haviv and Regev, CCC'15). Additionally, we provide a possible direction to improve our $\widetilde{O}(k^{1.5})$ upper bound by proving an improvement of Chang's lemma for $k$-Fourier-sparse Boolean functions. Second, we show that if a concept class $\mathcal{C}$ can be exactly learned using $Q$ quantum membership queries, then it can also be learned using $O\left(\frac{Q^2}{\log Q}\log|\mathcal{C}|\right)$ \emph{classical} membership queries. This improves the previous-best simulation result (Servedio and Gortler, SICOMP'04) by a $\log Q$-factor.
△ Less
Submitted 10 November, 2021; v1 submitted 30 September, 2018;
originally announced October 2018.
-
Edge Based Data-Driven Pipelines (Technical Report)
Authors:
Eduard Gibert Renart,
Daniel Balouek-Thomert,
Manish Parashar
Abstract:
This research reports investigates an edge on-device stream processing platform, which extends the serverless com- puting model to the edge to help facilitate real-time data analytics across the cloud and edge in a uniform manner. We investigate associated use cases and architectural design. We deployed and tested our system on edge devices (Raspberry Pi and Android Phone), which proves that strea…
▽ More
This research reports investigates an edge on-device stream processing platform, which extends the serverless com- puting model to the edge to help facilitate real-time data analytics across the cloud and edge in a uniform manner. We investigate associated use cases and architectural design. We deployed and tested our system on edge devices (Raspberry Pi and Android Phone), which proves that stream processing analytics can be performed at the edge of the network with single board computers in a real-time fashion.
△ Less
Submitted 3 August, 2018;
originally announced August 2018.
-
Using Intel Optane Devices for In-situ Data Staging in HPC Workflows
Authors:
Pradeep Subedi,
Philip E. Davis,
J. J. Villalobos,
Ivan Rodero,
Manish Parashar
Abstract:
Emerging non-volatile memory technologies (NVRAM) offer alternatives to hard drives that are persistent, while providing similar latencies to DRAM. Intel recently released the Optane drive, which features 3D XPoint memory technology. This device can be deployed as an SSD or as persistent memory. In this paper, we provide a performance comparison between Optane (SSD DC4800X) and NVMe (SSD DC3700) d…
▽ More
Emerging non-volatile memory technologies (NVRAM) offer alternatives to hard drives that are persistent, while providing similar latencies to DRAM. Intel recently released the Optane drive, which features 3D XPoint memory technology. This device can be deployed as an SSD or as persistent memory. In this paper, we provide a performance comparison between Optane (SSD DC4800X) and NVMe (SSD DC3700) drives as block devices. We study the performance from two perspectives: 1) Benchmarking of drives using FIO workloads, and 2) Assessing the impact of using Optane over NVMe within the DataSpaces framework for in-memory data staging to support in-situ scientific workflows.
△ Less
Submitted 11 July, 2018;
originally announced July 2018.
-
Challenges and Considerations for Utilizing Burst Buffers in High-Performance Computing
Authors:
Melissa Romanus,
Robert B. Ross,
Manish Parashar
Abstract:
As high-performance computing (HPC) moves into the exascale era, computer scientists and engineers must find innovative ways of transferring and processing unprecedented amounts of data. As the scale and complexity of the applications running on these machines increases, the cost of their interactions and data exchanges (in terms of latency, energy, runtime, etc.) can increase exponentially. In or…
▽ More
As high-performance computing (HPC) moves into the exascale era, computer scientists and engineers must find innovative ways of transferring and processing unprecedented amounts of data. As the scale and complexity of the applications running on these machines increases, the cost of their interactions and data exchanges (in terms of latency, energy, runtime, etc.) can increase exponentially. In order to address I/O coordination and communication issues, computing vendors are develo** an intermediate layer between compute nodes and the parallel file system composed of different types of memory (NVRAM, DRAM, SSD). These large scale memory appliances are being called 'burst buffers.' In this paper, we envision advanced memory at various levels of HPC hardware and derive potential use cases for how to take advantage of it. We then present the challenges and issues that arise when utilizing burst buffers in next-generation supercomputers and map the challenges to the use cases. Lastly, we discuss the emerging state-of-the-art burst buffer solutions that are expected to become available by the end of the year in new HPC systems and which use cases these implementations may satisfy.
△ Less
Submitted 29 September, 2015; v1 submitted 17 September, 2015;
originally announced September 2015.
-
Second Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2): Submission, Peer-Review and Sorting Process, and Results
Authors:
Daniel S. Katz,
Gabrielle Allen,
Neil Chue Hong,
Karen Cranston,
Manish Parashar,
David Proctor,
Matthew Turk,
Colin C. Venters,
Nancy Wilkins-Diehr
Abstract:
This technical report discusses the submission and peer-review process used by the Second Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2) and the results of that process. It is intended to record both the alternative submission and program organization model used by WSSSPE2 as well as the papers associated with the workshop that resulted from that process.
This technical report discusses the submission and peer-review process used by the Second Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2) and the results of that process. It is intended to record both the alternative submission and program organization model used by WSSSPE2 as well as the papers associated with the workshop that resulted from that process.
△ Less
Submitted 6 February, 2015; v1 submitted 13 November, 2014;
originally announced November 2014.
-
First Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE): Submission and Peer-Review Process, and Results
Authors:
Daniel S. Katz,
Gabrielle Allen,
Neil Chue Hong,
Manish Parashar,
David Proctor
Abstract:
This technical report discusses the submission and peer-review process used by the First Workshop on on Sustainable Software for Science: Practice and Experiences (WSSSPE) and the results of that process. It is intended to record both this alternative model as well as the papers associated with the workshop that resulted from that process.
This technical report discusses the submission and peer-review process used by the First Workshop on on Sustainable Software for Science: Practice and Experiences (WSSSPE) and the results of that process. It is intended to record both this alternative model as well as the papers associated with the workshop that resulted from that process.
△ Less
Submitted 2 May, 2014; v1 submitted 14 November, 2013;
originally announced November 2013.
-
Sustainable Software Development for Next-Gen Sequencing (NGS) Bioinformatics on Emerging Platforms
Authors:
Shel Swenson,
Yogesh Simmhan,
Viktor Prasanna,
Manish Parashar,
Jason Riedy,
David Bader,
Richard Vuduc
Abstract:
DNA sequence analysis is fundamental to life science research. The rapid development of next generation sequencing (NGS) technologies, and the richness and diversity of applications it makes feasible, have created an enormous gulf between the potential of this technology and the development of computational methods to realize this potential. Bridging this gap holds possibilities for broad impacts…
▽ More
DNA sequence analysis is fundamental to life science research. The rapid development of next generation sequencing (NGS) technologies, and the richness and diversity of applications it makes feasible, have created an enormous gulf between the potential of this technology and the development of computational methods to realize this potential. Bridging this gap holds possibilities for broad impacts toward multiple grand challenges and offers unprecedented opportunities for software innovation and research. We argue that NGS-enabled applications need a critical mass of sustainable software to benefit from emerging computing platforms' transformative potential. Accumulating the necessary critical mass will require leaders in computational biology, bioinformatics, computer science, and computer engineering work together to identify core opportunity areas, critical software infrastructure, and software sustainability challenges. Furthermore, due to the quickly changing nature of both bioinformatics software and accelerator technology, we conclude that creating sustainable accelerated bioinformatics software means constructing a sustainable bridge between the two fields. In particular, sustained collaboration between domain developers and technology experts is needed to develop the accelerated kernels, libraries, frameworks and middleware that could provide the needed flexible link from NGS bioinformatics applications to emerging platforms.
△ Less
Submitted 26 October, 2013; v1 submitted 7 September, 2013;
originally announced September 2013.
-
Cross-layer Application-aware Power/Energy Management for Extreme Scale Science
Authors:
Ivan Rodero,
Manish Parashar
Abstract:
High Performance Computing (HPC) has evolved over the past decades into increasingly complex and powerful systems. Current HPC systems consume several MWs of power, enough to power small towns, and are in fact soon approaching the limits of the power available to them. Estimates are with the given current technology, achieving exascale will require hundreds of MW, which is not feasible from multip…
▽ More
High Performance Computing (HPC) has evolved over the past decades into increasingly complex and powerful systems. Current HPC systems consume several MWs of power, enough to power small towns, and are in fact soon approaching the limits of the power available to them. Estimates are with the given current technology, achieving exascale will require hundreds of MW, which is not feasible from multiple perspectives. Architecture and technology researchers are aggressively addressing this; however as past history is shown, innovation at these levels are not sufficient and have to be accompanied with innovations at higher levels (algorithms, programming, runtime, OS) to achieve the multiple orders of magnitude reduction - i.e., a comprehensive cross-layer and application-aware strategy is required. Furthermore, energy/power-efficiency has to be addressed in combination with quality of solutions, performance and reliability and other objectives and appropriate tradeoffs are required.
△ Less
Submitted 10 April, 2013;
originally announced April 2013.
-
Survey and Analysis of Production Distributed Computing Infrastructures
Authors:
Daniel S. Katz,
Shantenu Jha,
Manish Parashar,
Omer Rana,
Jon Weissman
Abstract:
This report has two objectives. First, we describe a set of the production distributed infrastructures currently available, so that the reader has a basic understanding of them. This includes explaining why each infrastructure was created and made available and how it has succeeded and failed. The set is not complete, but we believe it is representative.
Second, we describe the infrastructures i…
▽ More
This report has two objectives. First, we describe a set of the production distributed infrastructures currently available, so that the reader has a basic understanding of them. This includes explaining why each infrastructure was created and made available and how it has succeeded and failed. The set is not complete, but we believe it is representative.
Second, we describe the infrastructures in terms of their use, which is a combination of how they were designed to be used and how users have found ways to use them. Applications are often designed and created with specific infrastructures in mind, with both an appreciation of the existing capabilities provided by those infrastructures and an anticipation of their future capabilities. Here, the infrastructures we discuss were often designed and created with specific applications in mind, or at least specific types of applications. The reader should understand how the interplay between the infrastructure providers and the users leads to such usages, which we call usage modalities. These usage modalities are really abstractions that exist between the infrastructures and the applications; they influence the infrastructures by representing the applications, and they influence the ap- plications by representing the infrastructures.
△ Less
Submitted 13 August, 2012;
originally announced August 2012.
-
Stable characteristic evolution of generic 3-dimensional single-black-hole spacetimes
Authors:
The Binary Black Hole Grand Challenge Alliance,
:,
R. Gomez,
L. Lehner,
R. Marsa,
J. Winicour,
A. Abrahams,
A. Anderson,
P. Anninos,
T. Baumgarte,
N. Bishop,
S. Brandt J. Browne,
K. Camarda,
M. Choptuik,
R. Correl,
G. Cook,
C. Evans,
L. Finn,
G. Fox,
T. Haupt,
M. Huq,
L. Kidder,
S. Klasky,
P. Laguna,
W. Landry
, et al. (20 additional authors not shown)
Abstract:
We report new results which establish that the accurate 3-dimensional numerical simulation of generic single-black-hole spacetimes has been achieved by characteristic evolution with unlimited long term stability. Our results cover a selection of distorted, moving and spinning single black holes, with evolution times up to 60,000M.
We report new results which establish that the accurate 3-dimensional numerical simulation of generic single-black-hole spacetimes has been achieved by characteristic evolution with unlimited long term stability. Our results cover a selection of distorted, moving and spinning single black holes, with evolution times up to 60,000M.
△ Less
Submitted 20 January, 1998;
originally announced January 1998.
-
Boosted three-dimensional black-hole evolutions with singularity excision
Authors:
The Binary Black Hole Grand Challenge Alliance,
:,
G. B. Cook,
M. F. Huq,
S. A. Klasky,
M. A. Scheel,
A. M. Abrahams,
A. Anderson,
P. Anninos,
T. W. Baumgarte,
N. T. Bishop,
S. R. Brandt,
J. C. Browne,
K. Camarda,
M. W. Choptuik,
C. R. Evans,
L. S. Finn,
G. C. Fox,
R. Gomez,
T. Haupt,
L. E. Kidder,
P. Laguna,
W. Landry,
L. Lehner,
J. Lenaghan
, et al. (21 additional authors not shown)
Abstract:
Binary black hole interactions provide potentially the strongest source of gravitational radiation for detectors currently under development. We present some results from the Binary Black Hole Grand Challenge Alliance three- dimensional Cauchy evolution module. These constitute essential steps towards modeling such interactions and predicting gravitational radiation waveforms. We report on singl…
▽ More
Binary black hole interactions provide potentially the strongest source of gravitational radiation for detectors currently under development. We present some results from the Binary Black Hole Grand Challenge Alliance three- dimensional Cauchy evolution module. These constitute essential steps towards modeling such interactions and predicting gravitational radiation waveforms. We report on single black hole evolutions and the first successful demonstration of a black hole moving freely through a three-dimensional computational grid via a Cauchy evolution: a hole moving ~6M at 0.1c during a total evolution of duration ~60M.
△ Less
Submitted 26 November, 1997;
originally announced November 1997.
-
Gravitational wave extraction and outer boundary conditions by perturbative matching
Authors:
The Binary Black Hole Grand Challenge Alliance,
:,
A. M. Abrahams,
L. Rezzolla,
M. E. Rupright,
A. Anderson,
P. Anninos,
T. W. Baumgarte,
N. T. Bishop,
S. R. Brandt,
J. C. Browne,
K. Camarda,
M. W. Choptuik,
G. B. Cook,
C. R. Evans,
L. S. Finn,
G. Fox,
R. Gomez,
T. Haupt,
M. F. Huq,
L. E. Kidder,
S. Klasky,
P. Laguna,
W. Landry,
L. Lehner
, et al. (20 additional authors not shown)
Abstract:
We present a method for extracting gravitational radiation from a three-dimensional numerical relativity simulation and, using the extracted data, to provide outer boundary conditions. The method treats dynamical gravitational variables as nonspherical perturbations of Schwarzschild geometry. We discuss a code which implements this method and present results of tests which have been performed wi…
▽ More
We present a method for extracting gravitational radiation from a three-dimensional numerical relativity simulation and, using the extracted data, to provide outer boundary conditions. The method treats dynamical gravitational variables as nonspherical perturbations of Schwarzschild geometry. We discuss a code which implements this method and present results of tests which have been performed with a three dimensional numerical relativity code.
△ Less
Submitted 30 September, 1997;
originally announced September 1997.