-
Extending Memory Capacity in Consumer Devices with Emerging Non-Volatile Memory: An Experimental Study
Authors:
Geraldo F. Oliveira,
Saugata Ghose,
Juan Gómez-Luna,
Amirali Boroumand,
Alexis Savery,
Sonny Rao,
Salman Qazi,
Gwendal Grignou,
Rahul Thakur,
Eric Shiu,
Onur Mutlu
Abstract:
The number and diversity of consumer devices are growing rapidly, alongside their target applications' memory consumption. Unfortunately, DRAM scalability is becoming a limiting factor to the available memory capacity in consumer devices. As a potential solution, manufacturers have introduced emerging non-volatile memories (NVMs) into the market, which can be used to increase the memory capacity o…
▽ More
The number and diversity of consumer devices are growing rapidly, alongside their target applications' memory consumption. Unfortunately, DRAM scalability is becoming a limiting factor to the available memory capacity in consumer devices. As a potential solution, manufacturers have introduced emerging non-volatile memories (NVMs) into the market, which can be used to increase the memory capacity of consumer devices by augmenting or replacing DRAM. Since entirely replacing DRAM with NVM in consumer devices imposes large system integration and design challenges, recent works propose extending the total main memory space available to applications by using NVM as swap space for DRAM. However, no prior work analyzes the implications of enabling a real NVM-based swap space in real consumer devices.
In this work, we provide the first analysis of the impact of extending the main memory space of consumer devices using off-the-shelf NVMs. We extensively examine system performance and energy consumption when the NVM device is used as swap space for DRAM main memory to effectively extend the main memory capacity. For our analyses, we equip real web-based Chromebook computers with the Intel Optane SSD, which is a state-of-the-art low-latency NVM-based SSD device. We compare the performance and energy consumption of interactive workloads running on our Chromebook with NVM-based swap space, where the Intel Optane SSD capacity is used as swap space to extend main memory capacity, against two state-of-the-art systems: (i) a baseline system with double the amount of DRAM than the system with the NVM-based swap space; and (ii) a system where the Intel Optane SSD is naively replaced with a state-of-the-art (yet slower) off-the-shelf NAND-flash-based SSD, which we use as a swap space of equivalent size as the NVM-based swap space.
△ Less
Submitted 19 September, 2023; v1 submitted 3 November, 2021;
originally announced November 2021.
-
Structured Nonnegative Matrix Factorization for Traffic Flow Estimation of Large Cloud Networks
Authors:
Syed Muhammad Atif,
Nicolas Gillis,
Sameer Qazi,
Imran Naseem
Abstract:
Network traffic matrix estimation is an ill-posed linear inverse problem: it requires to estimate the unobservable origin destination traffic flows, X, given the observable link traffic flows, Y, and a binary routing matrix, A, which are such that Y = AX. This is a challenging but vital problem as accurate estimation of OD flows is required for several network management tasks. In this paper, we p…
▽ More
Network traffic matrix estimation is an ill-posed linear inverse problem: it requires to estimate the unobservable origin destination traffic flows, X, given the observable link traffic flows, Y, and a binary routing matrix, A, which are such that Y = AX. This is a challenging but vital problem as accurate estimation of OD flows is required for several network management tasks. In this paper, we propose a novel model for the network traffic matrix estimation problem which maps high-dimension OD flows to low-dimension latent flows with the following three constraints: (1) nonnegativity constraint on the estimated OD flows, (2) autoregression constraint that enables the proposed model to effectively capture temporal patterns of the OD flows, and (3) orthogonality constraint that ensures the map** between low-dimensional latent flows and the corresponding link flows to be distance preserving. The parameters of the proposed model are estimated with a training algorithm based on Nesterov accelerated gradient and generally shows fast convergence. We validate the proposed traffic flow estimation model on two real backbone IP network datasets, namely Internet2 and G'EANT. Empirical results show that the proposed model outperforms the state-of-the-art models not only in terms of tracking the individual OD flows but also in terms of standard performance metrics. The proposed model is also found to be highly scalable compared to the existing state-of-the-art approaches.
△ Less
Submitted 15 October, 2021;
originally announced October 2021.
-
Probing triple higgs self coupling and effect of beam polarization in lepton colliders
Authors:
Ijaz Ahmed,
Ujala Nawaz,
Taimoor Khurshid,
Shamona Fawad Qazi
Abstract:
One of the main objectives of almost all future (lepton) colliders is to measure the self-coupling of triple Higgs in the Standard Model. By elongating the Standard Model's scalar sector, using incipient Higgs doublet along with a quadratic (Higgs) potential should reveal many incipient features of the model and the possibility of the emergence of additional Higgs self-couplings. The self-coupling…
▽ More
One of the main objectives of almost all future (lepton) colliders is to measure the self-coupling of triple Higgs in the Standard Model. By elongating the Standard Model's scalar sector, using incipient Higgs doublet along with a quadratic (Higgs) potential should reveal many incipient features of the model and the possibility of the emergence of additional Higgs self-couplings. The self-coupling of the Higgs boson helps in reconstructing the scalar potential. The main objective of this paper is to extract Higgs self-coupling by numerically analyzing several scattering processes governed by two Higgs doublet models (2HDM). These scattering processes include various possible combinations of final states in the triple Higgs sector. The determination of production cross-section of scattering processes is carried out using two different scenarios, with and without polarization of incoming beam and is extended to a center of mass energy up to $\sqrt{s}$ = 3 $TeV$. The computation is carried out in Type-1 2HDM. Here we consider the case of exact alignment limit ($s_{βα}$ = 1) and masses of extra Higgs state are equal that is $m_H = m_{H^0} = m_{A^0} = m_{H^\pm}$. This choice is made to minimize the oblique parameters. The decays of the final state of each process are investigated to estimate the number of events at integrated luminosity of $1ab^{-1}$ and $3ab^{-1}$.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Analysis of trilinear Higgs self coupling in Two Higgs Doublet model at lepton collider
Authors:
Ijaz Ahmed,
Muhammad Danish Aslam,
Taimoor Khurshid,
Jamil Muhammad,
Shamona Fawad Qazi
Abstract:
In this study, computational analysis of neutral Higgs bosons $h$, $H$ and $A$ is carried out within the parameter space of Two Higgs Doublet Model (2HDM) type-I in exact alignment limit of $\sin{(β- α)} = 1$ at compact linear collider. Assuming Compact Linear Collider (CLIC) scenario where the electron-positron beams will be collided at $\sqrt{s}$ = 1.5 TeV. Two different values of predicted inte…
▽ More
In this study, computational analysis of neutral Higgs bosons $h$, $H$ and $A$ is carried out within the parameter space of Two Higgs Doublet Model (2HDM) type-I in exact alignment limit of $\sin{(β- α)} = 1$ at compact linear collider. Assuming Compact Linear Collider (CLIC) scenario where the electron-positron beams will be collided at $\sqrt{s}$ = 1.5 TeV. Two different values of predicted integrated luminosities are used in our calculations, 1000 $fb^{-1}$ and 2500 $fb^{-1}$. Three signal processes $e^+ e^- \rightarrow Zhh \rightarrow jjb\bar{b}b\bar{b}$, $e^+ e^- \rightarrow ZHH \rightarrow jjb\bar{b}b\bar{b}$ and $e^+ e^- \rightarrow Zhh \rightarrow jjb\bar{b}b\bar{b}$ are selected for analysis. The polarized colliding beams are used to enhance the signal production cross-section. Low $\tanβ$ and equal Higgs masses regime is chosen in favor of Hadronic decay of $Z$ boson and $H \rightarrow b\bar{b}$. Different signal scenarios are selected and event generation is performed for each process separately. The $W$ and $Z$ boson, as well as top quark backgrounds are analyzed. Signal significance is computed at each Higgs mass hypothesis for three signal processes. After a comprehensive study, we did not find sizeable amount of signal events on top of the background but still, signal significance is found to be larger than 1, without taking into account the detector effects and systematics. The maximum calculated value of signal significance is observed to lie in the range of 150 $\leq$ $m_H$ $\leq$ 250 GeV for $Zhh$ while for $ZHH$ the range is 175 $\leq$ $m_H$ $\leq$ 200 GeV at 1000 $fb^{-1}$ and 175 $\leq$ $m_H$ $\leq$ 225 GeV region at 2500 $fb^{-1}$. Similarly, for $ZAA$ process, the significance is highest at $m_A$ = 175 GeV for both 1000 and 2500 $fb^{-1}$.
△ Less
Submitted 28 May, 2024; v1 submitted 8 October, 2021;
originally announced October 2021.
-
A Novel Compressed Sensing Technique for Traffic Matrix Estimation of Software Defined Cloud Networks
Authors:
Sameer Qazi,
Syed Muhammad Atif,
Muhammad Bilal Kadri
Abstract:
Traffic Matrix estimation has always caught attention from researchers for better network management and future planning. With the advent of high traffic loads due to Cloud Computing platforms and Software Defined Networking based tunable routing and traffic management algorithms on the Internet, it is more necessary as ever to be able to predict current and future traffic volumes on the network.…
▽ More
Traffic Matrix estimation has always caught attention from researchers for better network management and future planning. With the advent of high traffic loads due to Cloud Computing platforms and Software Defined Networking based tunable routing and traffic management algorithms on the Internet, it is more necessary as ever to be able to predict current and future traffic volumes on the network. For large networks such origin-destination traffic prediction problem takes the form of a large under-constrained and under-determined system of equations with a dynamic measurement matrix. In this work, we present our Compressed Sensing with Dynamic Model Estimation (CS-DME) architecture suitable for modern software defined networks. Our main contributions are: (1) we formulate an approach in which measurement matrix in the compressed sensing scheme can be accurately and dynamically estimated through a reformulation of the problem based on traffic demands. (2) We show that the problem formulation using a dynamic measurement matrix based on instantaneous traffic demands may be used instead of a stationary binary routing matrix which is more suitable to modern Software Defined Networks that are constantly evolving in terms of routing by inspection of its Eigen Spectrum using two real world datasets. (3) We also show that linking this compressed measurement matrix dynamically with the measured parameters can lead to acceptable estimation of Origin Destination (OD) Traffic flows with marginally poor results with other state-of-art schemes relying on fixed measurement matrices. (4) Furthermore, using this compressed reformulated problem, a new strategy for selection of vantage points for most efficient traffic matrix estimation is also presented through a secondary compression technique based on subset of link measurements.
△ Less
Submitted 6 November, 2018;
originally announced November 2018.
-
Tri-Compress: A Cascaded Data Compression Framework for Smart Electricity Distribution Systems
Authors:
Syed Muhammad Atif,
Anees Ahmed,
Sameer Qazi
Abstract:
Modern smart distribution system requires storage, transmission and processing of big data generated by sensors installed in electric meters. On one hand, this data is essentially required for intelligent decision making by smart grid but on the other hand storage, transmission and processing of that huge amount of data is also a challenge. Present approaches to compress this information have only…
▽ More
Modern smart distribution system requires storage, transmission and processing of big data generated by sensors installed in electric meters. On one hand, this data is essentially required for intelligent decision making by smart grid but on the other hand storage, transmission and processing of that huge amount of data is also a challenge. Present approaches to compress this information have only relied on the traditional matrix decomposition techniques benefitting from low number of principal components to represent the entire data. This paper proposes a cascaded data compression technique that blends three different methods in order to achieve high compression rate for efficient storage and transmission. In the first and second stages, two lossy data compression techniques are used, namely Singular Value Decomposition (SVD) and Normalization; Third stage achieves further compression by using the technique of Sparsity Encoding (SE) which is a lossless compression technique but only having appreciable benefits for sparse data sets. Our simulation results show that the combined use of the 3 techniques achieves data compression ratio to be 15% higher than state of the art SVD for small, sparse datasets and up to 28% higher in large, non-sparse datasets with acceptable Mean Absolute Error (MAE).
△ Less
Submitted 18 July, 2018;
originally announced July 2018.
-
Improved SVD-based Initialization for Nonnegative Matrix Factorization using Low-Rank Correction
Authors:
Atif Muhammad Syed,
Sameer Qazi,
Nicolas Gillis
Abstract:
Due to the iterative nature of most nonnegative matrix factorization (\textsc{NMF}) algorithms, initialization is a key aspect as it significantly influences both the convergence and the final solution obtained. Many initialization schemes have been proposed for NMF, among which one of the most popular class of methods are based on the singular value decomposition (SVD). However, these SVD-based i…
▽ More
Due to the iterative nature of most nonnegative matrix factorization (\textsc{NMF}) algorithms, initialization is a key aspect as it significantly influences both the convergence and the final solution obtained. Many initialization schemes have been proposed for NMF, among which one of the most popular class of methods are based on the singular value decomposition (SVD). However, these SVD-based initializations do not satisfy a rather natural condition, namely that the error should decrease as the rank of factorization increases. In this paper, we propose a novel SVD-based \textsc{NMF} initialization to specifically address this shortcoming by taking into account the SVD factors that were discarded to obtain a nonnegative initialization. This method, referred to as nonnegative SVD with low-rank correction (NNSVD-LRC), allows us to significantly reduce the initial error at a negligible additional computational cost using the low-rank structure of the discarded SVD factors. NNSVD-LRC has two other advantages compared to previous SVD-based initializations: (1) it provably generates sparse initial factors, and (2) it is faster as it only requires to compute a truncated SVD of rank $\lceil r/2 + 1 \rceil$ where $r$ is the factorization rank of the sought NMF decomposition (as opposed to a rank-$r$ truncated SVD for other methods). We show on several standard dense and sparse data sets that our new method competes favorably with state-of-the-art SVD-based initializations for NMF.
△ Less
Submitted 11 July, 2018;
originally announced July 2018.
-
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
Authors:
Sadia Afroz,
Mobin Javed,
Vern Paxson,
Shoaib Asif Qazi,
Shaarif Sajid,
Michael Carl Tschantz
Abstract:
This paper examines different reasons the websites may vary in their availability by location. Prior works on availability mostly focus on censorship by nation states. We look at three forms of server-side blocking: blocking visitors from the EU to avoid GDPR compliance, blocking based upon the visitor's country, and blocking due to security concerns. We argue that these and other forms of blockin…
▽ More
This paper examines different reasons the websites may vary in their availability by location. Prior works on availability mostly focus on censorship by nation states. We look at three forms of server-side blocking: blocking visitors from the EU to avoid GDPR compliance, blocking based upon the visitor's country, and blocking due to security concerns. We argue that these and other forms of blocking warrant more research.
△ Less
Submitted 1 June, 2018;
originally announced June 2018.
-
Exploring Server-side Blocking of Regions
Authors:
Sadia Afroz,
Michael Carl Tschantz,
Shaarif Sajid,
Shoaib Asif Qazi,
Mobin Javed,
Vern Paxson
Abstract:
One of the Internet's greatest strengths is the degree to which it facilitates access to any of its resources from users anywhere in the world. However, users in the develo** world have complained of websites blocking their countries. We explore this phenomenon using a measurement study. With a combination of automated page loads, manual checking, and traceroutes, we can say, with high confidenc…
▽ More
One of the Internet's greatest strengths is the degree to which it facilitates access to any of its resources from users anywhere in the world. However, users in the develo** world have complained of websites blocking their countries. We explore this phenomenon using a measurement study. With a combination of automated page loads, manual checking, and traceroutes, we can say, with high confidence, that some websites do block users from some regions. We cannot say, with high confidence, why, or even based on what criteria, they do so except for in some cases where the website states a reason. We do report qualitative evidence that fears of abuse and the costs of serving requests to some regions may play a role.
△ Less
Submitted 29 May, 2018;
originally announced May 2018.
-
Dark Matter Benchmark Models for Early LHC Run-2 Searches: Report of the ATLAS/CMS Dark Matter Forum
Authors:
Daniel Abercrombie,
Nural Akchurin,
Ece Akilli,
Juan Alcaraz Maestre,
Brandon Allen,
Barbara Alvarez Gonzalez,
Jeremy Andrea,
Alexandre Arbey,
Georges Azuelos,
Patrizia Azzi,
Mihailo Backović,
Yang Bai,
Swagato Banerjee,
James Beacham,
Alexander Belyaev,
Antonio Boveia,
Amelia Jean Brennan,
Oliver Buchmueller,
Matthew R. Buckley,
Giorgio Busoni,
Michael Buttignol,
Giacomo Cacciapaglia,
Regina Caputo,
Linda Carpenter,
Nuno Filipe Castro
, et al. (114 additional authors not shown)
Abstract:
This document is the final report of the ATLAS-CMS Dark Matter Forum, a forum organized by the ATLAS and CMS collaborations with the participation of experts on theories of Dark Matter, to select a minimal basis set of dark matter simplified models that should support the design of the early LHC Run-2 searches. A prioritized, compact set of benchmark models is proposed, accompanied by studies of t…
▽ More
This document is the final report of the ATLAS-CMS Dark Matter Forum, a forum organized by the ATLAS and CMS collaborations with the participation of experts on theories of Dark Matter, to select a minimal basis set of dark matter simplified models that should support the design of the early LHC Run-2 searches. A prioritized, compact set of benchmark models is proposed, accompanied by studies of the parameter space of these models and a repository of generator implementations. This report also addresses how to apply the Effective Field Theory formalism for collider searches and present the results of such interpretations.
△ Less
Submitted 3 July, 2015;
originally announced July 2015.
-
An Interacting Scenario for Dark Energy in Bianchi Type-I Universe
Authors:
Hassan Amirhashchi,
S. N. A. Qazi,
Hishamuddin Zainuddin
Abstract:
We study the interaction between dark energy (DE) and dark matter (DM) in the scope of anisotropic bianchi type I space-time. First we derive the general form of the dark energy equation of state parameter (EoS) in both non-interacting and interacting cases and then we examine it's future by applying a hyperbolic scale factor. It is shown that in non-interacting case, depending on the value of the…
▽ More
We study the interaction between dark energy (DE) and dark matter (DM) in the scope of anisotropic bianchi type I space-time. First we derive the general form of the dark energy equation of state parameter (EoS) in both non-interacting and interacting cases and then we examine it's future by applying a hyperbolic scale factor. It is shown that in non-interacting case, depending on the value of the anisotropy parameter $K$, the dark energy EoS parameter is varying from phantom to quintessence whereas in interacting case EoS parameter vary in quintessence region. However, in both cases the dark energy EoS parameter $ω^{de}$, ultimately (i. e at $z=-1$) tends to the cosmological constant ($ω^{de}=-1$). Moreover, we fixed the cosmological bound on the anisotropy parameter $K$ by using the recent observational data of Hubble parameter.
△ Less
Submitted 22 May, 2014;
originally announced May 2014.
-
Disjoint-Path Selection in Internet: What traceroutes tell us?
Authors:
Sameer Qazi,
Tim Moors
Abstract:
Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid route flap**, recovery mechanisms may be dampened, making adaptation slow. Unstructured overlays have been proposed to mitigate the issues of path and performance failures in the Internet by routing through an indirect-path…
▽ More
Routing policies used in the Internet can be restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid route flap**, recovery mechanisms may be dampened, making adaptation slow. Unstructured overlays have been proposed to mitigate the issues of path and performance failures in the Internet by routing through an indirect-path via overlay peer(s). Choosing alternate-paths in overlay networks is a challenging issue. Ensuring both availability and performance guarantees on alternate paths requires aggressive monitoring of all overlay paths using active probing; this limits scalability. An alternate technique to select an overlay-path is to bias its selection based on physical disjointness criteria to bypass the failure on the primary-path. Recently, several techniques have emerged which can optimize the selection of a disjoint-path without incurring the high costs associated with probing paths. In this paper, we show that using only commodity approaches, i.e. running infrequent traceroutes between overlay hosts, a lot of information can be revealed about the underlying physical path diversity in the overlay network which can be used to make informed-guesses for alternate-path selection. We test our approach using datasets between real-world hosts in AMP and RIPE networks.
△ Less
Submitted 5 May, 2014; v1 submitted 29 April, 2014;
originally announced April 2014.
-
Finding Alternate Paths in the Internet:A Survey of Techniques for End-to-End Path Discovery
Authors:
Sameer Qazi,
Tim Moors
Abstract:
The Internet provides physical path diversity between a large number of hosts, making it possible for networks to use alternative paths when one path fails to deliver the required Quality of Service. However, for various reasons, many established protocols (e.g. de facto Internet inter-domain routing protocol, Border-Gateway Protocol - BGP) do not fully exploit such alternate paths. This paper sur…
▽ More
The Internet provides physical path diversity between a large number of hosts, making it possible for networks to use alternative paths when one path fails to deliver the required Quality of Service. However, for various reasons, many established protocols (e.g. de facto Internet inter-domain routing protocol, Border-Gateway Protocol - BGP) do not fully exploit such alternate paths. This paper surveys research into techniques for discovering end-to-end alternate paths, including those based on monitoring path performance, choosing paths that are maximally disjoint, and in routing across multiple paths. It surveys proposals for making BGP better able to exploit multiple paths and how multi-homing can create alternate paths. It also describes how alternate paths can be realized through detour routing (application layer mechanisms) and routing deflections (network layer mechanisms). It also discusses Fast Re-Route techniques for construction of backup routes. It concludes by surveying open research issues into the discovery and use of alternate paths in the Internet.
△ Less
Submitted 23 August, 2013;
originally announced October 2013.