-
Distributed astrophysics simulations using Octo-Tiger with RISC-V CPUs using HPX and Kokkos
Authors:
Patrick Diehl,
Gregor Daiß,
Steven R. Brandt,
Alireza Kheirkhahan,
Srinivas Yadav Singanaboina,
Dominic Marcello,
Chris Taylor,
John Leidel,
Hartmut Kaiser
Abstract:
In recent years, interest in RISC-V computing architectures have moved from academic to mainstream, especially in the field of High Performance Computing where energy limitations are increasingly a point of concern. The results presented in this paper are part of a longer-term evaluation of RISC-V's viability for HPC applications. In this work, we use the Octo-Tiger multi-physics, multi-scale, 3D…
▽ More
In recent years, interest in RISC-V computing architectures have moved from academic to mainstream, especially in the field of High Performance Computing where energy limitations are increasingly a point of concern. The results presented in this paper are part of a longer-term evaluation of RISC-V's viability for HPC applications. In this work, we use the Octo-Tiger multi-physics, multi-scale, 3D adaptive mesh refinement astrophysics application as the bases for our analysis. We report on our experience in porting this modern C++ code (which is built upon several open-source libraries such as HPX and Kokkos) to RISC-V. We also compare the application's performance, scalability, and power consumption on RISC-V to an A64FX system.
△ Less
Submitted 10 May, 2024;
originally announced July 2024.
-
Evaluating AI-generated code for C++, Fortran, Go, Java, Julia, Matlab, Python, R, and Rust
Authors:
Patrick Diehl,
Noujoud Nader,
Steve Brandt,
Hartmut Kaiser
Abstract:
This study evaluates the capabilities of ChatGPT versions 3.5 and 4 in generating code across a diverse range of programming languages. Our objective is to assess the effectiveness of these AI models for generating scientific programs. To this end, we asked ChatGPT to generate three distinct codes: a simple numerical integration, a conjugate gradient solver, and a parallel 1D stencil-based heat eq…
▽ More
This study evaluates the capabilities of ChatGPT versions 3.5 and 4 in generating code across a diverse range of programming languages. Our objective is to assess the effectiveness of these AI models for generating scientific programs. To this end, we asked ChatGPT to generate three distinct codes: a simple numerical integration, a conjugate gradient solver, and a parallel 1D stencil-based heat equation solver. The focus of our analysis was on the compilation, runtime performance, and accuracy of the codes. While both versions of ChatGPT successfully created codes that compiled and ran (with some help), some languages were easier for the AI to use than others (possibly because of the size of the training sets used). Parallel codes -- even the simple example we chose to study here -- also difficult for the AI to generate correctly.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Local Advice and Local Decompression
Authors:
Alkida Balliu,
Sebastian Brandt,
Fabian Kuhn,
Krzysztof Nowicki,
Dennis Olivetti,
Eva Rotenberg,
Jukka Suomela
Abstract:
Algorithms with advice have received ample attention in the distributed and online settings, and they have recently proven useful also in dynamic settings. In this work we study local computation with advice: the goal is to solve a graph problem $Π$ with a distributed algorithm in $f(Δ)$ communication rounds, for some function $f$ that only depends on the maximum degree $Δ$ of the graph, and the k…
▽ More
Algorithms with advice have received ample attention in the distributed and online settings, and they have recently proven useful also in dynamic settings. In this work we study local computation with advice: the goal is to solve a graph problem $Π$ with a distributed algorithm in $f(Δ)$ communication rounds, for some function $f$ that only depends on the maximum degree $Δ$ of the graph, and the key question is how many bits of advice per node are needed. Our main results are:
- Any locally checkable labeling problem can be solved in graphs with sub-exponential growth with only $1$ bit of advice per node. Moreover, we can make the set of nodes that carry advice bits arbitrarily sparse, that is, we can make arbitrarily small the ratio between nodes carrying a 1 and the nodes carrying a 0. - The assumption of sub-exponential growth is necessary: assuming the Exponential-Time Hypothesis, there are LCLs that cannot be solved in general with any constant number of bits per node. - In any graph we can find an almost-balanced orientation (indegrees and outdegrees differ by at most one) with $1$ bit of advice per node, and again we can make the advice arbitrarily sparse. - As a corollary, we can also compress an arbitrary subset of edges so that a node of degree $d$ stores only $d/2 + 2$ bits, and we can decompress it locally, in $f(Δ)$ rounds. - In any graph of maximum degree $Δ$, we can find a $Δ$-coloring (if it exists) with $1$ bit of advice per node, and again, we can make the advice arbitrarily sparse. - In any $3$-colorable graph, we can find a $3$-coloring with $1$ bit of advice per node. Here, it remains open whether we can make the advice arbitrarily sparse.
Our work shows that for many problems the key threshold is not whether we can achieve, say, $1$ bit of advice per node, but whether we can make the advice arbitrarily sparse.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Completing the Node-Averaged Complexity Landscape of LCLs on Trees
Authors:
Alkida Balliu,
Sebastian Brandt,
Fabian Kuhn,
Dennis Olivetti,
Gustav Schmid
Abstract:
The node-averaged complexity of a problem captures the number of rounds nodes of a graph have to spend on average to solve the problem in the LOCAL model. A challenging line of research with regards to this new complexity measure is to understand the complexity landscape of locally checkable labelings (LCLs) on families of bounded-degree graphs. Particularly interesting in this context is the fami…
▽ More
The node-averaged complexity of a problem captures the number of rounds nodes of a graph have to spend on average to solve the problem in the LOCAL model. A challenging line of research with regards to this new complexity measure is to understand the complexity landscape of locally checkable labelings (LCLs) on families of bounded-degree graphs. Particularly interesting in this context is the family of bounded-degree trees as there, for the worst-case complexity, we know a complete characterization of the possible complexities and structures of LCL problems. A first step for the node-averaged complexity case has been achieved recently [DISC '23], where the authors in particular showed that in bounded-degree trees, there is a large complexity gap: There are no LCL problems with a deterministic node-averaged complexity between $ω(\log^* n)$ and $n^{o(1)}$. For randomized algorithms, they even showed that the node-averaged complexity is either $O(1)$ or $n^{Ω(1)}$. In this work we fill in the remaining gaps and give a complete description of the node-averaged complexity landscape of LCLs on bounded-degree trees. Our contributions are threefold.
- On bounded-degree trees, there is no LCL with a node-averaged complexity between $ω(1)$ and $(\log^*n)^{o(1)}$.
- For any constants $0<r_1 < r_2 \leq 1$ and $\varepsilon>0$, there exists a constant $c$ and an LCL problem with node-averaged complexity between $Ω((\log^* n)^c)$ and $O((\log^* n)^{c+\varepsilon})$.
- For any constants $0<α\leq 1/2$ and $\varepsilon>0$, there exists an LCL problem with node-averaged complexity $Θ(n^x)$ for some $x\in [α, α+\varepsilon]$.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Tight Lower Bounds in the Supported LOCAL Model
Authors:
Alkida Balliu,
Thomas Boudier,
Sebastian Brandt,
Dennis Olivetti
Abstract:
We study the complexity of fundamental distributed graph problems in the recently popular setting where information about the input graph is available to the nodes before the start of the computation. We focus on the most common such setting, known as the Supported LOCAL model, where the input graph (on which the studied graph problem has to be solved) is guaranteed to be a subgraph of the underly…
▽ More
We study the complexity of fundamental distributed graph problems in the recently popular setting where information about the input graph is available to the nodes before the start of the computation. We focus on the most common such setting, known as the Supported LOCAL model, where the input graph (on which the studied graph problem has to be solved) is guaranteed to be a subgraph of the underlying communication network.
Building on a successful lower bound technique for the LOCAL model called round elimination, we develop a framework for proving complexity lower bounds in the stronger Supported LOCAL model. Our framework reduces the task of proving a (deterministic or randomized) lower bound for a given problem $Π$ to the graph-theoretic task of proving non-existence of a solution to another problem $Π'$ (on a suitable graph) that can be derived from $Π$ in a mechanical manner.
We use the developed framework to obtain substantial (and, in the majority of cases, asymptotically tight) Supported LOCAL lower bounds for a variety of fundamental graph problems, including maximal matching, maximal independent set, ruling sets, arbdefective colorings, and generalizations thereof. In a nutshell, for essentially any major lower bound proved in the LOCAL model in recent years, we prove a similar lower bound in the Supported LOCAL model.
Our framework also gives rise to a new deterministic version of round elimination in the LOCAL model: while, previous to our work, the general round elimination technique required the use of randomness (even for obtaining deterministic lower bounds), our framework allows to obtain deterministic (and therefore via known lifting techniques also randomized) lower bounds in a purely deterministic manner. Previously, such a purely deterministic application of round elimination was only known for the specific problem of sinkless orientation [SOSA'23].
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
HPX with Spack and Singularity Containers: Evaluating Overheads for HPX/Kokkos using an astrophysics application
Authors:
Patrick Diehl,
Steven R. Brandt,
Gregor Daiß,
Hartmut Kaiser
Abstract:
Cloud computing for high performance computing resources is an emerging topic. This service is of interest to researchers who care about reproducible computing, for software packages with complex installations, and for companies or researchers who need the compute resources only occasionally or do not want to run and maintain a supercomputer on their own. The connection between HPC and containers…
▽ More
Cloud computing for high performance computing resources is an emerging topic. This service is of interest to researchers who care about reproducible computing, for software packages with complex installations, and for companies or researchers who need the compute resources only occasionally or do not want to run and maintain a supercomputer on their own. The connection between HPC and containers is exemplified by the fact that Microsoft Azure's Eagle cloud service machine is number three on the November 23 Top 500 list. For cloud services, the HPC application and dependencies are installed in containers, e.g. Docker, Singularity, or something else, and these containers are executed on the physical hardware. Although containerization leverages the existing Linux kernel and should not impose overheads on the computation, there is the possibility that machine-specific optimizations might be lost, particularly machine-specific installs of commonly used packages. In this paper, we will use an astrophysics application using HPX-Kokkos and measure overheads on homogeneous resources, e.g. Supercomputer Fugaku, using CPUs only and on heterogenous resources, e.g. LSU's hybrid CPU and GPU system. We will report on challenges in compiling, running, and using the containers as well as performance performance differences.
△ Less
Submitted 7 May, 2024; v1 submitted 11 February, 2024;
originally announced May 2024.
-
The Role of Likes: How Online Feedback Impacts Users' Mental Health
Authors:
Angelina Voggenreiter,
Sophie Brandt,
Fabian Putterer,
Andreas Frings,
Juergen Pfeffer
Abstract:
Social media usage has been shown to have both positive and negative consequences for users' mental health. Several studies indicated that peer feedback plays an important role in the relationship between social media use and mental health. In this research, we analyse the impact of receiving online feedback on users' emotional experience, social connectedness and self-esteem. In an experimental s…
▽ More
Social media usage has been shown to have both positive and negative consequences for users' mental health. Several studies indicated that peer feedback plays an important role in the relationship between social media use and mental health. In this research, we analyse the impact of receiving online feedback on users' emotional experience, social connectedness and self-esteem. In an experimental study, we let users interact with others on a Facebook-like system over the course of a week while controlling for the amount of positive reactions they receive from their peers. We find that experiencing little to no reaction from others does not only elicit negative emotions and stress amongst users, but also induces low levels of self-esteem. In contrast, receiving much positive online feedback, evokes feelings of social connectedness and reduces overall loneliness. On a societal level, our study can help to better understand the mechanisms through which social media use impacts mental health in a positive or negative way. On a methodological level, we provide a new open-source tool for designing and conducting social media experiments.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Location Estimation and Recovery using 5G Positioning: Thwarting GNSS Spoofing Attacks
Authors:
Aneet Kumar Dutta,
Sebastian Brandt,
Mridula Singh
Abstract:
The availability of cheap GNSS spoofers can prevent safe navigation and tracking of road users. It can lead to loss of assets, inaccurate fare estimation, enforcing the wrong speed limit, miscalculated toll tax, passengers reaching an incorrect location, etc. The techniques designed to prevent and detect spoofing by using cryptographic solutions or receivers capable of differentiating legitimate a…
▽ More
The availability of cheap GNSS spoofers can prevent safe navigation and tracking of road users. It can lead to loss of assets, inaccurate fare estimation, enforcing the wrong speed limit, miscalculated toll tax, passengers reaching an incorrect location, etc. The techniques designed to prevent and detect spoofing by using cryptographic solutions or receivers capable of differentiating legitimate and attack signals are insufficient in detecting GNSS spoofing of road users. Recent studies, testbeds, and 3GPP standards are exploring the possibility of hybrid positioning, where GNSS data will be combined with the 5G-NR positioning to increase the security and accuracy of positioning. We design the Location Estimation and Recovery(LER) systems to estimate the correct absolute position using the combination of GNSS and 5G positioning with other road users, where a subset of road users can be malicious and collude to prevent spoofing detection. Our Location Verification Protocol extends the understanding of Message Time of Arrival Codes (MTAC) to prevent attacks against malicious provers. The novel Recovery and Meta Protocol uses road users' dynamic and unpredictable nature to detect GNSS spoofing. This protocol provides fast detection of GNSS spoofing with a very low rate of false positives and can be customized to a large family of settings. Even in a (highly unrealistic) worst-case scenario where each user is malicious with a probability of as large as 0.3, our protocol detects GNSS spoofing with high probability after communication and ranging with at most 20 road users, with a false positive rate close to 0. SUMO simulations for road traffic show that we can detect GNSS spoofing in 2.6 minutes since its start under moderate traffic conditions.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Evaluating HPX and Kokkos on RISC-V using an Astrophysics Application Octo-Tiger
Authors:
Parick Diehl,
Gregor Daiss,
Steven R. Brandt,
Alireza Kheirkhahan,
Hartmut Kaiser,
Christopher Taylor,
John Leidel
Abstract:
In recent years, computers based on the RISC-V architecture have raised broad interest in the high-performance computing (HPC) community. As the RISC-V community develops the core instruction set architecture (ISA) along with ISA extensions, the HPC community has been actively ensuring HPC applications and environments are supported. In this context, assessing the performance of asynchronous many-…
▽ More
In recent years, computers based on the RISC-V architecture have raised broad interest in the high-performance computing (HPC) community. As the RISC-V community develops the core instruction set architecture (ISA) along with ISA extensions, the HPC community has been actively ensuring HPC applications and environments are supported. In this context, assessing the performance of asynchronous many-task runtime systems (AMT) is essential. In this paper, we describe our experience with porting of a full 3D adaptive mesh-refinement, multi-scale, multi-model, and multi-physics application, Octo-Tiger, that is based on the HPX AMT, and we explore its performance characteristics on different RISC-V systems. Considering the (limited) capabilities of the RISC-V test systems we used, Octo-Tiger already shows promising results and good scaling. We, however, expect that exceptional hardware support based on dedicated ISA extensions (such as single-cycle context switches, extended atomic operations, and direct support for HPX's global address space) would allow for even better performance results.
△ Less
Submitted 17 August, 2023;
originally announced September 2023.
-
On the Node-Averaged Complexity of Locally Checkable Problems on Trees
Authors:
Alkida Balliu,
Sebastian Brandt,
Fabian Kuhn,
Dennis Olivetti,
Gustav Schmid
Abstract:
Over the past decade, a long line of research has investigated the distributed complexity landscape of locally checkable labeling (LCL) problems on bounded-degree graphs, culminating in an almost-complete classification on general graphs and a complete classification on trees. The latter states that, on bounded-degree trees, any LCL problem has deterministic worst-case time complexity $O(1)$,…
▽ More
Over the past decade, a long line of research has investigated the distributed complexity landscape of locally checkable labeling (LCL) problems on bounded-degree graphs, culminating in an almost-complete classification on general graphs and a complete classification on trees. The latter states that, on bounded-degree trees, any LCL problem has deterministic worst-case time complexity $O(1)$, $Θ(\log^* n)$, $Θ(\log n)$, or $Θ(n^{1/k})$ for some positive integer $k$, and all of those complexity classes are nonempty. Moreover, randomness helps only for (some) problems with deterministic worst-case complexity $Θ(\log n)$, and if randomness helps (asymptotically), then it helps exponentially.
In this work, we study how many distributed rounds are needed on average per node in order to solve an LCL problem on trees. We obtain a partial classification of the deterministic node-averaged complexity landscape for LCL problems. As our main result, we show that every problem with worst-case round complexity $O(\log n)$ has deterministic node-averaged complexity $O(\log^* n)$. Then we show how using randomization we can speed this up and show that every problem with worst case round complexity $O(\log n)$ has randomized node-averaged complexity $O(1)$. We further establish bounds on the node-averaged complexity of problems with worst-case complexity $Θ(n^{1/k})$: we show that all these problems have node-averaged complexity $\widetildeΩ(n^{1 / (2^k - 1)})$, and that this lower bound is tight for some problems. The lower bound holds even for the randomized case and the upper bound is a deterministic algorithm.
△ Less
Submitted 15 February, 2024; v1 submitted 8 August, 2023;
originally announced August 2023.
-
Benchmarking the Parallel 1D Heat Equation Solver in Chapel, Charm++, C++, HPX, Go, Julia, Python, Rust, Swift, and Java
Authors:
Patrick Diehl,
Steven R. Brandt,
Max Morris,
Nikunj Gupta,
Hartmut Kaiser
Abstract:
Many scientific high performance codes that simulate e.g. black holes, coastal waves, climate and weather, etc. rely on block-structured meshes and use finite differencing methods to iteratively solve the appropriate systems of differential equations. In this paper we investigate implementations of an extremely simple simulation of this type using various programming systems and languages. We focu…
▽ More
Many scientific high performance codes that simulate e.g. black holes, coastal waves, climate and weather, etc. rely on block-structured meshes and use finite differencing methods to iteratively solve the appropriate systems of differential equations. In this paper we investigate implementations of an extremely simple simulation of this type using various programming systems and languages. We focus on a shared memory, parallelized algorithm that simulates a 1D heat diffusion using asynchronous queues for the ghost zone exchange. We discuss the advantages of the various platforms and explore the performance of this model code on different computing architectures: Intel, AMD, and ARM64FX. As a result, Python was the slowest of the set we compared. Java, Go, Swift, and Julia were the intermediate performers. The higher performing platforms were C++, Rust, Chapel, Charm++, and HPX.
△ Less
Submitted 10 July, 2023; v1 submitted 18 May, 2023;
originally announced July 2023.
-
Discovering Interpretable Directions in the Semantic Latent Space of Diffusion Models
Authors:
René Haas,
Inbar Huberman-Spiegelglas,
Rotem Mulayoff,
Stella Graßhof,
Sami S. Brandt,
Tomer Michaeli
Abstract:
Denoising Diffusion Models (DDMs) have emerged as a strong competitor to Generative Adversarial Networks (GANs). However, despite their widespread use in image synthesis and editing applications, their latent space is still not as well understood. Recently, a semantic latent space for DDMs, coined `$h$-space', was shown to facilitate semantic image editing in a way reminiscent of GANs. The $h$-spa…
▽ More
Denoising Diffusion Models (DDMs) have emerged as a strong competitor to Generative Adversarial Networks (GANs). However, despite their widespread use in image synthesis and editing applications, their latent space is still not as well understood. Recently, a semantic latent space for DDMs, coined `$h$-space', was shown to facilitate semantic image editing in a way reminiscent of GANs. The $h$-space is comprised of the bottleneck activations in the DDM's denoiser across all timesteps of the diffusion process. In this paper, we explore the properties of h-space and propose several novel methods for finding meaningful semantic directions within it. We start by studying unsupervised methods for revealing interpretable semantic directions in pretrained DDMs. Specifically, we show that global latent directions emerge as the principal components in the latent space. Additionally, we provide a novel method for discovering image-specific semantic directions by spectral analysis of the Jacobian of the denoiser w.r.t. the latent code. Next, we extend the analysis by finding directions in a supervised fashion in unconditional DDMs. We demonstrate how such directions can be found by relying on either a labeled data set of real images or by annotating generated samples with a domain-specific attribute classifier. We further show how to semantically disentangle the found direction by simple linear projection. Our approaches are applicable without requiring any architectural modifications, text-based guidance, CLIP-based optimization, or model fine-tuning.
△ Less
Submitted 29 May, 2024; v1 submitted 20 March, 2023;
originally announced March 2023.
-
Shared memory parallelism in Modern C++ and HPX
Authors:
Patrick Diehl,
Steven R. Brandt,
Hartmut Kaiser
Abstract:
Parallel programming remains a daunting challenge, from the struggle to express a parallel algorithm without cluttering the underlying synchronous logic, to describing which devices to employ in a calculation, to correctness. Over the years, numerous solutions have arisen, many of them requiring new programming languages, extensions to programming languages, or the addition of pragmas. Support for…
▽ More
Parallel programming remains a daunting challenge, from the struggle to express a parallel algorithm without cluttering the underlying synchronous logic, to describing which devices to employ in a calculation, to correctness. Over the years, numerous solutions have arisen, many of them requiring new programming languages, extensions to programming languages, or the addition of pragmas. Support for these various tools and extensions is available to a varying degree. In recent years, the C++ standards committee has worked to refine the language features and libraries needed to support parallel programming on a single computational node. Eventually, all major vendors and compilers will provide robust and performant implementations of these standards. Until then, the HPX library and runtime provides cutting edge implementations of the standards, as well as proposed standards and extensions. Because of these advances, it is now possible to write high performance parallel code without custom extensions to C++. We provide an overview of modern parallel programming in C++, describing the language and library features, and providing brief examples of how to use them.
△ Less
Submitted 9 August, 2023; v1 submitted 16 January, 2023;
originally announced February 2023.
-
Challenges related to system-of-systems for greening and climate adaptation in smart cities
Authors:
Sarah Brandt,
Julien Siebert
Abstract:
This paper presents the results of interviews conducted as part of the DYNASOS project. The objective was to collect challenges related to the design, implementation and management of system-of-systems (SoS) in the context of climate adaptation and greening of smart cities. 23 individuals from cities, academia, and industry were interviewed between March and May 2022 and 57 distinct challenges wer…
▽ More
This paper presents the results of interviews conducted as part of the DYNASOS project. The objective was to collect challenges related to the design, implementation and management of system-of-systems (SoS) in the context of climate adaptation and greening of smart cities. 23 individuals from cities, academia, and industry were interviewed between March and May 2022 and 57 distinct challenges were collected and analyzed. Our results show that while technical issues (such as interoperability or data acquisition) persist, non-technical issues are the main obstacles. Difficulties in information sharing, effective communication, and synchronization between different actors are the most important challenges.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
Controllable GAN Synthesis Using Non-Rigid Structure-from-Motion
Authors:
René Haas,
Stella Graßhof,
Sami S. Brandt
Abstract:
In this paper, we present an approach for combining non-rigid structure-from-motion (NRSfM) with deep generative models,and propose an efficient framework for discovering trajectories in the latent space of 2D GANs corresponding to changes in 3D geometry. Our approach uses recent advances in NRSfM and enables editing of the camera and non-rigid shape information associated with the latent codes wi…
▽ More
In this paper, we present an approach for combining non-rigid structure-from-motion (NRSfM) with deep generative models,and propose an efficient framework for discovering trajectories in the latent space of 2D GANs corresponding to changes in 3D geometry. Our approach uses recent advances in NRSfM and enables editing of the camera and non-rigid shape information associated with the latent codes without needing to retrain the generator. This formulation provides an implicit dense 3D reconstruction as it enables the image synthesis of novel shapes from arbitrary view angles and non-rigid structure. The method is built upon a sparse backbone, where a neural regressor is first trained to regress parameters describing the cameras and sparse non-rigid structure directly from the latent codes. The latent trajectories associated with changes in the camera and structure parameters are then identified by estimating the local inverse of the regressor in the neighborhood of a given latent code. The experiments show that our approach provides a versatile, systematic way to model, analyze, and edit the geometry and non-rigid structures of faces.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Distributed Maximal Matching and Maximal Independent Set on Hypergraphs
Authors:
Alkida Balliu,
Sebastian Brandt,
Fabian Kuhn,
Dennis Olivetti
Abstract:
We investigate the distributed complexity of maximal matching and maximal independent set (MIS) in hypergraphs in the LOCAL model. A maximal matching of a hypergraph $H=(V_H,E_H)$ is a maximal disjoint set $M\subseteq E_H$ of hyperedges and an MIS $S\subseteq V_H$ is a maximal set of nodes such that no hyperedge is fully contained in $S$. Both problems can be solved by a simple sequential greedy a…
▽ More
We investigate the distributed complexity of maximal matching and maximal independent set (MIS) in hypergraphs in the LOCAL model. A maximal matching of a hypergraph $H=(V_H,E_H)$ is a maximal disjoint set $M\subseteq E_H$ of hyperedges and an MIS $S\subseteq V_H$ is a maximal set of nodes such that no hyperedge is fully contained in $S$. Both problems can be solved by a simple sequential greedy algorithm, which can be implemented naively in $O(Δr + \log^* n)$ rounds, where $Δ$ is the maximum degree, $r$ is the rank, and $n$ is the number of nodes.
We show that for maximal matching, this naive algorithm is optimal in the following sense. Any deterministic algorithm for solving the problem requires $Ω(\min\{Δr, \log_{Δr} n\})$ rounds, and any randomized one requires $Ω(\min\{Δr, \log_{Δr} \log n\})$ rounds. Hence, for any algorithm with a complexity of the form $O(f(Δ, r) + g(n))$, we have $f(Δ, r) \in Ω(Δr)$ if $g(n)$ is not too large, and in particular if $g(n) = \log^* n$ (which is the optimal asymptotic dependency on $n$ due to Linial's lower bound [FOCS'87]). Our lower bound proof is based on the round elimination framework, and its structure is inspired by a new round elimination fixed point that we give for the $Δ$-vertex coloring problem in hypergraphs.
For the MIS problem on hypergraphs, we show that for $Δ\ll r$, there are significant improvements over the naive $O(Δr + \log^* n)$-round algorithm. We give two deterministic algorithms for the problem. We show that a hypergraph MIS can be computed in $O(Δ^2\cdot\log r + Δ\cdot\log r\cdot \log^* r + \log^* n)$ rounds. We further show that at the cost of a worse dependency on $Δ$, the dependency on $r$ can be removed almost entirely, by giving an algorithm with complexity $Δ^{O(Δ)}\cdot\log^* r + O(\log^* n)$.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Exponential Speedup Over Locality in MPC with Optimal Memory
Authors:
Alkida Balliu,
Sebastian Brandt,
Manuela Fischer,
Rustam Latypov,
Yannic Maus,
Dennis Olivetti,
Jara Uitto
Abstract:
Locally Checkable Labeling (LCL) problems are graph problems in which a solution is correct if it satisfies some given constraints in the local neighborhood of each node. Example problems in this class include maximal matching, maximal independent set, and coloring problems. A successful line of research has been studying the complexities of LCL problems on paths/cycles, trees, and general graphs,…
▽ More
Locally Checkable Labeling (LCL) problems are graph problems in which a solution is correct if it satisfies some given constraints in the local neighborhood of each node. Example problems in this class include maximal matching, maximal independent set, and coloring problems. A successful line of research has been studying the complexities of LCL problems on paths/cycles, trees, and general graphs, providing many interesting results for the LOCAL model of distributed computing. In this work, we initiate the study of LCL problems in the low-space Massively Parallel Computation (MPC) model. In particular, on forests, we provide a method that, given the complexity of an LCL problem in the LOCAL model, automatically provides an exponentially faster algorithm for the low-space MPC setting that uses optimal global memory, that is, truly linear.
While restricting to forests may seem to weaken the result, we emphasize that all known (conditional) lower bounds for the MPC setting are obtained by lifting lower bounds obtained in the distributed setting in tree-like networks (either forests or high girth graphs), and hence the problems that we study are challenging already on forests. Moreover, the most important technical feature of our algorithms is that they use optimal global memory, that is, memory linear in the number of edges of the graph. In contrast, most of the state-of-the-art algorithms use more than linear global memory. Further, they typically start with a dense graph, sparsify it, and then solve the problem on the residual graph, exploiting the relative increase in global memory. On forests, this is not possible, because the given graph is already as sparse as it can be, and using optimal memory requires new solutions.
△ Less
Submitted 19 August, 2022;
originally announced August 2022.
-
Traveler: Navigating Task Parallel Traces for Performance Analysis
Authors:
Sayef Azad Sakin,
Alex Bigelow,
R. Tohid,
Connor Scully-Allison,
Carlos Scheidegger,
Steven R. Brandt,
Christopher Taylor,
Kevin A. Huck,
Hartmut Kaiser,
Katherine E. Isaacs
Abstract:
Understanding the behavior of software in execution is a key step in identifying and fixing performance issues. This is especially important in high performance computing contexts where even minor performance tweaks can translate into large savings in terms of computational resource use. To aid performance analysis, developers may collect an execution trace - a chronological log of program activit…
▽ More
Understanding the behavior of software in execution is a key step in identifying and fixing performance issues. This is especially important in high performance computing contexts where even minor performance tweaks can translate into large savings in terms of computational resource use. To aid performance analysis, developers may collect an execution trace - a chronological log of program activity during execution. As traces represent the full history, developers can discover a wide array of possibly previously unknown performance issues, making them an important artifact for exploratory performance analysis. However, interactive trace visualization is difficult due to issues of data size and complexity of meaning. Traces represent nanosecond-level events across many parallel processes, meaning the collected data is often large and difficult to explore. The rise of asynchronous task parallel programming paradigms complicates the relation between events and their probable cause. To address these challenges, we conduct a continuing design study in collaboration with high performance computing researchers. We develop diverse and hierarchical ways to navigate and represent execution trace data in support of their trace analysis tasks. Through an iterative design process, we developed Traveler, an integrated visualization platform for task parallel traces. Traveler provides multiple linked interfaces to help navigate trace data from multiple contexts. We evaluate the utility of Traveler through feedback from users and a case study, finding that integrating multiple modes of navigation in our design supported performance analysis tasks and led to the discovery of previously unknown behavior in a distributed array library.
△ Less
Submitted 3 September, 2022; v1 submitted 29 July, 2022;
originally announced August 2022.
-
Distributed Edge Coloring in Time Polylogarithmic in $Δ$
Authors:
Alkida Balliu,
Sebastian Brandt,
Fabian Kuhn,
Dennis Olivetti
Abstract:
We provide new deterministic algorithms for the edge coloring problem, which is one of the classic and highly studied distributed local symmetry breaking problems. As our main result, we show that a $(2Δ-1)$-edge coloring can be computed in time $\mathrm{poly}\logΔ+ O(\log^* n)$ in the LOCAL model. This improves a result of Balliu, Kuhn, and Olivetti [PODC '20], who gave an algorithm with a quasi-…
▽ More
We provide new deterministic algorithms for the edge coloring problem, which is one of the classic and highly studied distributed local symmetry breaking problems. As our main result, we show that a $(2Δ-1)$-edge coloring can be computed in time $\mathrm{poly}\logΔ+ O(\log^* n)$ in the LOCAL model. This improves a result of Balliu, Kuhn, and Olivetti [PODC '20], who gave an algorithm with a quasi-polylogarithmic dependency on $Δ$. We further show that in the CONGEST model, an $(8+\varepsilon)Δ$-edge coloring can be computed in $\mathrm{poly}\logΔ+ O(\log^* n)$ rounds. The best previous $O(Δ)$-edge coloring algorithm that can be implemented in the CONGEST model is by Barenboim and Elkin [PODC '11] and it computes a $2^{O(1/\varepsilon)}Δ$-edge coloring in time $O(Δ^\varepsilon + \log^* n)$ for any $\varepsilon\in(0,1]$.
△ Less
Submitted 2 June, 2022;
originally announced June 2022.
-
Tensor-based Emotion Editing in the StyleGAN Latent Space
Authors:
René Haas,
Stella Graßhof,
Sami S. Brandt
Abstract:
In this paper, we use a tensor model based on the Higher-Order Singular Value Decomposition (HOSVD) to discover semantic directions in Generative Adversarial Networks. This is achieved by first embedding a structured facial expression database into the latent space using the e4e encoder. Specifically, we discover directions in latent space corresponding to the six prototypical emotions: anger, dis…
▽ More
In this paper, we use a tensor model based on the Higher-Order Singular Value Decomposition (HOSVD) to discover semantic directions in Generative Adversarial Networks. This is achieved by first embedding a structured facial expression database into the latent space using the e4e encoder. Specifically, we discover directions in latent space corresponding to the six prototypical emotions: anger, disgust, fear, happiness, sadness, and surprise, as well as a direction for yaw rotation. These latent space directions are employed to change the expression or yaw rotation of real face images. We compare our found directions to similar directions found by two other methods. The results show that the visual quality of the resultant edits are on par with State-of-the-Art. It can also be concluded that the tensor-based model is well suited for emotion and yaw editing, i.e., that the emotion or yaw rotation of a novel face image can be robustly changed without a significant effect on identity or other attributes in the images.
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
Deterministic Distributed algorithms and Descriptive Combinatorics on Δ-regular trees
Authors:
Sebastian Brandt,
Yi-Jun Chang,
Jan Grebík,
Christoph Grunau,
Václav Rozhoň,
Zoltán Vidnyánszky
Abstract:
We study complexity classes of local problems on regular trees from the perspective of distributed local algorithms and descriptive combinatorics. We show that, surprisingly, some deterministic local complexity classes from the hierarchy of distributed computing exactly coincide with well studied classes of problems in descriptive combinatorics. Namely, we show that a local problem admits a contin…
▽ More
We study complexity classes of local problems on regular trees from the perspective of distributed local algorithms and descriptive combinatorics. We show that, surprisingly, some deterministic local complexity classes from the hierarchy of distributed computing exactly coincide with well studied classes of problems in descriptive combinatorics. Namely, we show that a local problem admits a continuous solution if and only if it admits a local algorithm with local complexity $O(\log^* n)$, and a Baire measurable solution if and only if it admits a local algorithm with local complexity $O(\log n)$.
△ Less
Submitted 20 April, 2022;
originally announced April 2022.
-
Efficient Classification of Locally Checkable Problems in Regular Trees
Authors:
Alkida Balliu,
Sebastian Brandt,
Yi-Jun Chang,
Dennis Olivetti,
Jan Studený,
Jukka Suomela
Abstract:
We give practical, efficient algorithms that automatically determine the asymptotic distributed round complexity of a given locally checkable graph problem in the $[Θ(\log n), Θ(n)]$ region, in two settings. We present one algorithm for unrooted regular trees and another algorithm for rooted regular trees. The algorithms take the description of a locally checkable labeling problem as input, and th…
▽ More
We give practical, efficient algorithms that automatically determine the asymptotic distributed round complexity of a given locally checkable graph problem in the $[Θ(\log n), Θ(n)]$ region, in two settings. We present one algorithm for unrooted regular trees and another algorithm for rooted regular trees. The algorithms take the description of a locally checkable labeling problem as input, and the running time is polynomial in the size of the problem description. The algorithms decide if the problem is solvable in $O(\log n)$ rounds. If not, it is known that the complexity has to be $Θ(n^{1/k})$ for some $k = 1, 2, \dotsc$, and in this case the algorithms also output the right value of the exponent $k$.
In rooted trees in the $O(\log n)$ case we can then further determine the exact complexity class by using algorithms from prior work; for unrooted trees the more fine-grained classification in the $O(\log n)$ region remains an open question.
△ Less
Submitted 2 September, 2022; v1 submitted 17 February, 2022;
originally announced February 2022.
-
The Landscape of Distributed Complexities on Trees and Beyond
Authors:
Christoph Grunau,
Vaclav Rozhon,
Sebastian Brandt
Abstract:
We study the local complexity landscape of locally checkable labeling (LCL) problems on constant-degree graphs with a focus on complexities below $\log^* n$.
Our contribution is threefold:
Our main contribution is that we complete the classification of the complexity landscape of LCL problems on trees in the LOCAL model, by proving that every LCL problem with local complexity $o(\log^* n)$ has…
▽ More
We study the local complexity landscape of locally checkable labeling (LCL) problems on constant-degree graphs with a focus on complexities below $\log^* n$.
Our contribution is threefold:
Our main contribution is that we complete the classification of the complexity landscape of LCL problems on trees in the LOCAL model, by proving that every LCL problem with local complexity $o(\log^* n)$ has actually complexity $O(1)$. This result improves upon the previous speedup result from $o(\log \log^* n)$ to $O(1)$ by [Chang, Pettie, FOCS 2017].
In the related LCA and Volume models [Alon, Rubinfeld, Vardi, Xie, SODA 2012, Rubinfeld, Tamir, Vardi, Xie, 2011, Rosenbaum, Suomela, PODC 2020], we prove the same speedup from $o(\log^* n)$ to $O(1)$ for all bounded degree graphs.
Similarly, we complete the classification of the LOCAL complexity landscape of oriented $d$-dimensional grids by proving that any LCL problem with local complexity $o(\log^* n)$ has actually complexity $O(1)$. This improves upon the previous speed-up from $o(\sqrt[d]{\log^* n})$ by Suomela in [Chang, Pettie, FOCS 2017].
△ Less
Submitted 23 September, 2022; v1 submitted 9 February, 2022;
originally announced February 2022.
-
Towards a Complexity Classification of LCL Problems in Massively Parallel Computation
Authors:
Sebastian Brandt,
Rustam Latypov,
Jara Uitto
Abstract:
In this work, we develop the low-space Massively Parallel Computation (MPC) complexity landscape for a family of fundamental graph problems on trees. We present a general method that solves most locally checkable labeling (LCL) problems exponentially faster in the low-space MPC model than in the LOCAL message passing model. In particular, we show that all solvable LCL problems on trees can be solv…
▽ More
In this work, we develop the low-space Massively Parallel Computation (MPC) complexity landscape for a family of fundamental graph problems on trees. We present a general method that solves most locally checkable labeling (LCL) problems exponentially faster in the low-space MPC model than in the LOCAL message passing model. In particular, we show that all solvable LCL problems on trees can be solved in $O(\log n)$ time (high-complexity regime) and that all LCL problems on trees with deterministic complexity $n^{o(1)}$ in the LOCAL model can be solved in $O(\log \log n)$ time (mid-complexity regime). We observe that obtaining a greater speed-up than from $n^{o(1)}$ to $Θ(\log \log n)$ is conditionally impossible, since the problem of 3-coloring trees, which is a LCL problem with LOCAL time complexity $n^{o(1)}$, has a conditional MPC lower bound of $Ω(\log \log n)$ [Linial, FOCS'87; Ghaffari, Kuhn and Uitto, FOCS'19]. We emphasize that we solve LCL problems on constant-degree trees, and that our algorithms are deterministic, component-stable, and work in the low-space MPC model, where local memory is $O(n^δ)$ for $δ\in (0,1)$ and global memory is $O(m)$.
For the high-complexity regime, there are two key ingredients. One is a novel $O(\log n)$-time tree rooting algorithm, which may be of independent interest. The other is a novel pointer-chain technique and analysis that allows us to solve any solvable LCL problem on trees in $O(\log n)$ time. For the mid-complexity regime, we adapt the approach by Chang and Pettie [FOCS'17], who gave a canonical LOCAL algorithm for solving LCL problems on trees.
△ Less
Submitted 3 March, 2022; v1 submitted 17 December, 2021;
originally announced December 2021.
-
Tensor-based Subspace Factorization for StyleGAN
Authors:
René Haas,
Stella Graßhof,
Sami Sebastian Brandt
Abstract:
In this paper, we propose $τ$GAN a tensor-based method for modeling the latent space of generative models. The objective is to identify semantic directions in latent space. To this end, we propose to fit a multilinear tensor model on a structured facial expression database, which is initially embedded into latent space. We validate our approach on StyleGAN trained on FFHQ using BU-3DFE as a struct…
▽ More
In this paper, we propose $τ$GAN a tensor-based method for modeling the latent space of generative models. The objective is to identify semantic directions in latent space. To this end, we propose to fit a multilinear tensor model on a structured facial expression database, which is initially embedded into latent space. We validate our approach on StyleGAN trained on FFHQ using BU-3DFE as a structured facial expression database. We show how the parameters of the multilinear tensor model can be approximated by Alternating Least Squares. Further, we introduce a tacked style-separated tensor model, defined as an ensemble of style-specific models to integrate our approach with the extended latent space of StyleGAN. We show that taking the individual styles of the extended latent space into account leads to higher model flexibility and lower reconstruction error. Finally, we do several experiments comparing our approach to former work on both GANs and multilinear models. Concretely, we analyze the expression subspace and find that the expression trajectories meet at an apathetic face that is consistent with earlier work. We also show that by changing the pose of a person, the generated image from our approach is closer to the ground truth than results from two competing approaches.
△ Less
Submitted 8 November, 2021;
originally announced November 2021.
-
On Homomorphism Graphs
Authors:
Sebastian Brandt,
Yi-Jun Chang,
Jan Grebík,
Christoph Grunau,
Václav Rozhoň,
Zoltán Vidnyánszky
Abstract:
We introduce a new type of examples of bounded degree acyclic Borel graphs and study their combinatorial properties in the context of descriptive combinatorics, using a generalization of the determinacy method of Marks. The motivation for the construction comes from the adaptation of this method to the LOCAL model of distributed computing. Our approach unifies the previous results in the area, as…
▽ More
We introduce a new type of examples of bounded degree acyclic Borel graphs and study their combinatorial properties in the context of descriptive combinatorics, using a generalization of the determinacy method of Marks. The motivation for the construction comes from the adaptation of this method to the LOCAL model of distributed computing. Our approach unifies the previous results in the area, as well as produces new ones. In particular, we show that for $Δ>2$ it is impossible to give a simple characterization of acyclic $Δ$-regular Borel graphs with Borel chromatic number at most $Δ$: such graphs form a $\mathbfΣ^1_2$-complete set. This implies a strong failure of Brooks'-like theorems in the Borel context.
△ Less
Submitted 29 April, 2024; v1 submitted 5 November, 2021;
originally announced November 2021.
-
Automated Essay Scoring Using Transformer Models
Authors:
Sabrina Ludwig,
Christian Mayer,
Christopher Hansen,
Kerstin Eilers,
Steffen Brandt
Abstract:
Automated essay scoring (AES) is gaining increasing attention in the education sector as it significantly reduces the burden of manual scoring and allows ad hoc feedback for learners. Natural language processing based on machine learning has been shown to be particularly suitable for text classification and AES. While many machine-learning approaches for AES still rely on a bag-of-words (BOW) appr…
▽ More
Automated essay scoring (AES) is gaining increasing attention in the education sector as it significantly reduces the burden of manual scoring and allows ad hoc feedback for learners. Natural language processing based on machine learning has been shown to be particularly suitable for text classification and AES. While many machine-learning approaches for AES still rely on a bag-of-words (BOW) approach, we consider a transformer-based approach in this paper, compare its performance to a logistic regression model based on the BOW approach and discuss their differences. The analysis is based on 2,088 email responses to a problem-solving task, that were manually labeled in terms of politeness. Both transformer models considered in that analysis outperformed without any hyper-parameter tuning the regression-based model. We argue that for AES tasks such as politeness classification, the transformer-based approach has significant advantages, while a BOW approach suffers from not taking word order into account and reducing the words to their stem. Further, we show how such models can help increase the accuracy of human raters, and we provide a detailed instruction on how to implement transformer-based models for one's own purpose.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Distributed $Δ$-Coloring Plays Hide-and-Seek
Authors:
Alkida Balliu,
Sebastian Brandt,
Fabian Kuhn,
Dennis Olivetti
Abstract:
We prove several new tight distributed lower bounds for classic symmetry breaking graph problems. As a basic tool, we first provide a new insightful proof that any deterministic distributed algorithm that computes a $Δ$-coloring on $Δ$-regular trees requires $Ω(\log_Δn)$ rounds and any randomized algorithm requires $Ω(\log_Δ\log n)$ rounds. We prove this result by showing that a natural relaxation…
▽ More
We prove several new tight distributed lower bounds for classic symmetry breaking graph problems. As a basic tool, we first provide a new insightful proof that any deterministic distributed algorithm that computes a $Δ$-coloring on $Δ$-regular trees requires $Ω(\log_Δn)$ rounds and any randomized algorithm requires $Ω(\log_Δ\log n)$ rounds. We prove this result by showing that a natural relaxation of the $Δ$-coloring problem is a fixed point in the round elimination framework.
As a first application, we show that our $Δ$-coloring lower bound proof directly extends to arbdefective colorings. We exactly characterize which variants of the arbdefective coloring problem are "easy", and which of them instead are "hard". As a second application, which we see as our main contribution, we use the structure of the fixed point as a building block to prove lower bounds as a function of $Δ$ for a large class of distributed symmetry breaking problems. For example, we obtain a tight lower bound for the fundamental problem of computing a $(2,β)$-ruling set. This is an exponential improvement over the best existing lower bound for the problem, which was proven in [FOCS '20]. Our lower bound even applies to a much more general family of problems that allows for almost arbitrary combinations of natural constraints from coloring problems, orientation problems, and independent set problems, and provides a single unified proof for known and new lower bound results for these types of problems.
Our lower bounds as a function of $Δ$ also imply lower bounds as a function of $n$. We obtain, for example, that maximal independent set, on trees, requires $Ω(\log n / \log \log n)$ rounds for deterministic algorithms, which is tight.
△ Less
Submitted 2 June, 2022; v1 submitted 1 October, 2021;
originally announced October 2021.
-
Improved Distributed Lower Bounds for MIS and Bounded (Out-)Degree Dominating Sets in Trees
Authors:
Alkida Balliu,
Sebastian Brandt,
Fabian Kuhn,
Dennis Olivetti
Abstract:
Recently, Balliu, Brandt, and Olivetti [FOCS '20] showed the first $ω(\log^* n)$ lower bound for the maximal independent set (MIS) problem in trees. In this work we prove lower bounds for a much more relaxed family of distributed symmetry breaking problems. As a by-product, we obtain improved lower bounds for the distributed MIS problem in trees.
For a parameter $k$ and an orientation of the edg…
▽ More
Recently, Balliu, Brandt, and Olivetti [FOCS '20] showed the first $ω(\log^* n)$ lower bound for the maximal independent set (MIS) problem in trees. In this work we prove lower bounds for a much more relaxed family of distributed symmetry breaking problems. As a by-product, we obtain improved lower bounds for the distributed MIS problem in trees.
For a parameter $k$ and an orientation of the edges of a graph $G$, we say that a subset $S$ of the nodes of $G$ is a $k$-outdegree dominating set if $S$ is a dominating set of $G$ and if in the induced subgraph $G[S]$, every node in $S$ has outdegree at most $k$. Note that for $k=0$, this definition coincides with the definition of an MIS. For a given $k$, we consider the problem of computing a $k$-outdegree dominating set. We show that, even in regular trees of degree at most $Δ$, in the standard \LOCAL model, there exists a constant $ε>0$ such that for $k\leq Δ^ε$, for the problem of computing a $k$-outdegree dominating set, any randomized algorithm requires at least $Ω(\min\{\logΔ,\sqrt{\log\log n}\})$ rounds and any deterministic algorithm requires at least $Ω(\min\{\logΔ,\sqrt{\log n}\})$ rounds.
The proof of our lower bounds is based on the recently highly successful round elimination technique. We provide a novel way to do simplifications for round elimination, which we expect to be of independent interest. Our new proof is considerably simpler than the lower bound proof in [FOCS '20]. In particular, our round elimination proof uses a family of problems that can be described by only a constant number of labels. The existence of such a proof for the MIS problem was believed impossible by the authors of [FOCS '20].
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
Local Problems on Trees from the Perspectives of Distributed Algorithms, Finitary Factors, and Descriptive Combinatorics
Authors:
Sebastian Brandt,
Yi-Jun Chang,
Jan Grebík,
Christoph Grunau,
Václav Rozhoň,
Zoltán Vidnyánszky
Abstract:
We study connections between distributed local algorithms, finitary factors of iid processes, and descriptive combinatorics in the context of regular trees.
We extend the Borel determinacy technique of Marks coming from descriptive combinatorics and adapt it to the area of distributed computing. Using this technique, we prove deterministic distributed $Ω(\log n)$-round lower bounds for problems…
▽ More
We study connections between distributed local algorithms, finitary factors of iid processes, and descriptive combinatorics in the context of regular trees.
We extend the Borel determinacy technique of Marks coming from descriptive combinatorics and adapt it to the area of distributed computing. Using this technique, we prove deterministic distributed $Ω(\log n)$-round lower bounds for problems from a natural class of homomorphism problems. Interestingly, these lower bounds seem beyond the current reach of the powerful round elimination technique responsible for all substantial locality lower bounds of the last years. Our key technical ingredient is a novel ID graph technique that we expect to be of independent interest.
We prove that a local problem admits a Baire measurable coloring if and only if it admits a local algorithm with local complexity $O(\log n)$, extending the classification of Baire measurable colorings of Bernshteyn. A key ingredient of the proof is a new and simple characterization of local problems that can be solved in $O(\log n)$ rounds. We complement this result by showing separations between complexity classes from distributed computing, finitary factors, and descriptive combinatorics. Most notably, the class of problems that allow a distributed algorithm with sublogarithmic randomized local complexity is incomparable with the class of problems with a Borel solution.
We hope that our treatment will help to view all three perspectives as part of a common theory of locality, in which we follow the insightful paper of [Bernshteyn -- arXiv 2004.04905].
△ Less
Submitted 3 June, 2021;
originally announced June 2021.
-
The randomized local computation complexity of the Lovász local lemma
Authors:
Sebastian Brandt,
Christoph Grunau,
Václav Rozhoň
Abstract:
The Local Computation Algorithm (LCA) model is a popular model in the field of sublinear-time algorithms that measures the complexity of an algorithm by the number of probes the algorithm makes in the neighborhood of one node to determine that node's output.
In this paper we show that the randomized LCA complexity of the Lovász Local Lemma (LLL) on constant degree graphs is $Θ(\log n)$. The lowe…
▽ More
The Local Computation Algorithm (LCA) model is a popular model in the field of sublinear-time algorithms that measures the complexity of an algorithm by the number of probes the algorithm makes in the neighborhood of one node to determine that node's output.
In this paper we show that the randomized LCA complexity of the Lovász Local Lemma (LLL) on constant degree graphs is $Θ(\log n)$. The lower bound follows by proving an $Ω(\log n)$ lower bound for the Sinkless Orientation problem introduced in [Brandt et al. STOC 2016]. This answers a question of [Rosenbaum, Suomela PODC 2020].
Additionally, we show that every randomized LCA algorithm for a locally checkable problem with a probe complexity of $o(\sqrt{\log{n}})$ can be turned into a deterministic LCA algorithm with a probe complexity of $O(\log^* n)$. This improves exponentially upon the currently best known speed-up result from $o(\log \log n)$ to $O(\log^* n)$ implied by the result of [Chang, Pettie FOCS 2017] in the LOCAL model.
Finally, we show that for every fixed constant $c \geq 2$, the deterministic VOLUME complexity of $c$-coloring a bounded degree tree is $Θ(n)$, where the VOLUME model is a close relative of the LCA model that was recently introduced by [Rosenbaum, Suomela PODC 2020].
△ Less
Submitted 3 December, 2021; v1 submitted 30 March, 2021;
originally announced March 2021.
-
Locally Checkable Problems in Rooted Trees
Authors:
Alkida Balliu,
Sebastian Brandt,
Yi-Jun Chang,
Dennis Olivetti,
Jan Studený,
Jukka Suomela,
Aleksandr Tereshchenko
Abstract:
Consider any locally checkable labeling problem $Π$ in rooted regular trees: there is a finite set of labels $Σ$, and for each label $x \in Σ$ we specify what are permitted label combinations of the children for an internal node of label $x$ (the leaf nodes are unconstrained). This formalism is expressive enough to capture many classic problems studied in distributed computing, including vertex co…
▽ More
Consider any locally checkable labeling problem $Π$ in rooted regular trees: there is a finite set of labels $Σ$, and for each label $x \in Σ$ we specify what are permitted label combinations of the children for an internal node of label $x$ (the leaf nodes are unconstrained). This formalism is expressive enough to capture many classic problems studied in distributed computing, including vertex coloring, edge coloring, and maximal independent set.
We show that the distributed computational complexity of any such problem $Π$ falls in one of the following classes: it is $O(1)$, $Θ(\log^* n)$, $Θ(\log n)$, or $n^{Θ(1)}$ rounds in trees with $n$ nodes (and all of these classes are nonempty). We show that the complexity of any given problem is the same in all four standard models of distributed graph algorithms: deterministic $\mathsf{LOCAL}$, randomized $\mathsf{LOCAL}$, deterministic $\mathsf{CONGEST}$, and randomized $\mathsf{CONGEST}$ model. In particular, we show that randomness does not help in this setting, and the complexity class $Θ(\log \log n)$ does not exist (while it does exist in the broader setting of general trees).
We also show how to systematically determine the complexity class of any such problem $Π$, i.e., whether $Π$ takes $O(1)$, $Θ(\log^* n)$, $Θ(\log n)$, or $n^{Θ(1)}$ rounds. While the algorithm may take exponential time in the size of the description of $Π$, it is nevertheless practical: we provide a freely available implementation of the classifier algorithm, and it is fast enough to classify many problems of interest.
△ Less
Submitted 2 September, 2022; v1 submitted 18 February, 2021;
originally announced February 2021.
-
Deploying a Task-based Runtime System on Raspberry Pi Clusters
Authors:
Nikunj Gupta,
Steve R. Brandt,
Bibek Wagle,
Nanmiao,
Alireza Kheirkhahan,
Patrick Diehl,
Hartmut Kaiser,
Felix W. Baumann
Abstract:
Arm technology is becoming increasingly important in HPC. Recently, Fugaku, an \arm-based system, was awarded the number one place in the Top500 list. Raspberry Pis provide an inexpensive platform to become familiar with this architecture. However, Pis can also be useful on their own. Here we describe our efforts to configure and benchmark the use of a Raspberry Pi cluster with the HPX/Phylanx pla…
▽ More
Arm technology is becoming increasingly important in HPC. Recently, Fugaku, an \arm-based system, was awarded the number one place in the Top500 list. Raspberry Pis provide an inexpensive platform to become familiar with this architecture. However, Pis can also be useful on their own. Here we describe our efforts to configure and benchmark the use of a Raspberry Pi cluster with the HPX/Phylanx platform (normally intended for use with HPC applications) and document the lessons we learned. First, we highlight the required changes in the configuration of the Pi to gain performance. Second, we explore how limited memory bandwidth limits the use of all cores in our shared memory benchmarks. Third, we evaluate whether low network bandwidth affects distributed performance. Fourth, we discuss the power consumption and the resulting trade-off in cost of operation and performance.
△ Less
Submitted 9 April, 2021; v1 submitted 8 October, 2020;
originally announced October 2020.
-
Generalizing the Sharp Threshold Phenomenon for the Distributed Complexity of the Lovász Local Lemma
Authors:
Sebastian Brandt,
Christoph Grunau,
Václav Rozhoň
Abstract:
Recently, Brandt, Maus and Uitto [PODC'19] showed that, in a restricted setting, the dependency of the complexity of the distributed Lovász Local Lemma (LLL) on the chosen LLL criterion exhibits a sharp threshold phenomenon: They proved that, under the LLL criterion $p2^d < 1$, if each random variable affects at most $3$ events, the deterministic complexity of the LLL in the LOCAL model is…
▽ More
Recently, Brandt, Maus and Uitto [PODC'19] showed that, in a restricted setting, the dependency of the complexity of the distributed Lovász Local Lemma (LLL) on the chosen LLL criterion exhibits a sharp threshold phenomenon: They proved that, under the LLL criterion $p2^d < 1$, if each random variable affects at most $3$ events, the deterministic complexity of the LLL in the LOCAL model is $O(d^2 + \log^* n)$. In stark contrast, under the criterion $p2^d \leq 1$, there is a randomized lower bound of $Ω(\log \log n)$ by Brandt et al. [STOC'16] and a deterministic lower bound of $Ω(\log n)$ by Chang, Kopelowitz and Pettie [FOCS'16]. Brandt, Maus and Uitto conjectured that the same behavior holds for the unrestricted setting where each random variable affects arbitrarily many events.
We prove their conjecture, by providing an algorithm that solves the LLL in time $O(d^2 + \log^* n)$ under the LLL criterion $p2^d < 1$, which is tight in bounded-degree graphs due to an $Ω(\log^* n)$ lower bound by Chung, Pettie and Su [PODC'14]. By the work of Brandt, Maus and Uitto, obtaining such an algorithm can be reduced to proving that all members in a certain family of functions in arbitrarily high dimensions are convex on some specific domain. Unfortunately, an analytical description of these functions is known only for dimension at most $3$, which led to the aforementioned restriction of their result. While obtaining those descriptions for functions of (substantially) higher dimension seems out of the reach of current techniques, we show that their convexity can be inferred by combinatorial means.
△ Less
Submitted 8 June, 2020;
originally announced June 2020.
-
Tight Bounds for Deterministic High-Dimensional Grid Exploration
Authors:
Sebastian Brandt,
Julian Portmann,
Jara Uitto
Abstract:
We study the problem of exploring an oriented grid with autonomous agents governed by finite automata. In the case of a 2-dimensional grid, the question how many agents are required to explore the grid, or equivalently, find a hidden treasure in the grid, is fully understood in both the synchronous and the semi-synchronous setting. For higher dimensions, Dobrev, Narayanan, Opatrny, and Pankratov […
▽ More
We study the problem of exploring an oriented grid with autonomous agents governed by finite automata. In the case of a 2-dimensional grid, the question how many agents are required to explore the grid, or equivalently, find a hidden treasure in the grid, is fully understood in both the synchronous and the semi-synchronous setting. For higher dimensions, Dobrev, Narayanan, Opatrny, and Pankratov [ICALP'19] showed very recently that, surprisingly, a (small) constant number of agents suffices to find the treasure, independent of the number of dimensions, thereby disproving a conjecture by Cohen, Emek, Louidor, and Uitto [SODA'17]. Dobrev et al. left as an open question whether their bounds on the number of agents can be improved. We answer this question in the affirmative for deterministic finite automata: we show that 3 synchronous and 4 semi-synchronous agents suffice to explore an $n$-dimensional grid for any constant $n$. The bounds are optimal and notably, the matching lower bounds already hold in the 2-dimensional case.
Our techniques can also be used to make progress on other open questions asked by Dobrev et al.: we prove that 4 synchronous and 5 semi-synchronous agents suffice for polynomial-time exploration, and we show that, under a natural assumption, 3 synchronous and 4 semi-synchronous agents suffice to explore unoriented grids of arbitrary dimension (which, again, is tight).
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Efficient Load-Balancing through Distributed Token Drop**
Authors:
Sebastian Brandt,
Barbara Keller,
Joel Rybicki,
Jukka Suomela,
Jara Uitto
Abstract:
We introduce a new graph problem, the token drop** game, and we show how to solve it efficiently in a distributed setting. We use the token drop** game as a tool to design an efficient distributed algorithm for stable orientations and more generally for locally optimal semi-matchings. The prior work by Czygrinow et al. (DISC 2012) finds a stable orientation in $O(Δ^5)$ rounds in graphs of maxi…
▽ More
We introduce a new graph problem, the token drop** game, and we show how to solve it efficiently in a distributed setting. We use the token drop** game as a tool to design an efficient distributed algorithm for stable orientations and more generally for locally optimal semi-matchings. The prior work by Czygrinow et al. (DISC 2012) finds a stable orientation in $O(Δ^5)$ rounds in graphs of maximum degree $Δ$, while we improve it to $O(Δ^4)$ and also prove a lower bound of $Ω(Δ)$.
△ Less
Submitted 17 February, 2021; v1 submitted 15 May, 2020;
originally announced May 2020.
-
Distributed Lower Bounds for Ruling Sets
Authors:
Alkida Balliu,
Sebastian Brandt,
Dennis Olivetti
Abstract:
Given a graph $G = (V,E)$, an $(α, β)$-ruling set is a subset $S \subseteq V$ such that the distance between any two vertices in $S$ is at least $α$, and the distance between any vertex in $V$ and the closest vertex in $S$ is at most $β$. We present lower bounds for distributedly computing ruling sets.
More precisely, for the problem of computing a $(2, β)$-ruling set in the LOCAL model, we show…
▽ More
Given a graph $G = (V,E)$, an $(α, β)$-ruling set is a subset $S \subseteq V$ such that the distance between any two vertices in $S$ is at least $α$, and the distance between any vertex in $V$ and the closest vertex in $S$ is at most $β$. We present lower bounds for distributedly computing ruling sets.
More precisely, for the problem of computing a $(2, β)$-ruling set in the LOCAL model, we show the following, where $n$ denotes the number of vertices, $Δ$ the maximum degree, and $c$ is some universal constant independent of $n$ and $Δ$.
$\bullet$ Any deterministic algorithm requires $Ω\left(\min \left\{ \frac{\log Δ}{β\log \log Δ} , \log_Δn \right\} \right)$ rounds, for all $β\le c \cdot \min\left\{ \sqrt{\frac{\log Δ}{\log \log Δ}} , \log_Δn \right\}$. By optimizing $Δ$, this implies a deterministic lower bound of $Ω\left(\sqrt{\frac{\log n}{β\log \log n}}\right)$ for all $β\le c \sqrt[3]{\frac{\log n}{\log \log n}}$.
$\bullet$ Any randomized algorithm requires $Ω\left(\min \left\{ \frac{\log Δ}{β\log \log Δ} , \log_Δ\log n \right\} \right)$ rounds, for all $β\le c \cdot \min\left\{ \sqrt{\frac{\log Δ}{\log \log Δ}} , \log_Δ\log n \right\}$. By optimizing $Δ$, this implies a randomized lower bound of $Ω\left(\sqrt{\frac{\log \log n}{β\log \log \log n}}\right)$ for all $β\le c \sqrt[3]{\frac{\log \log n}{\log \log \log n}}$.
For $β> 1$, this improves on the previously best lower bound of $Ω(\log^* n)$ rounds that follows from the 30-year-old bounds of Linial [FOCS'87] and Naor [J.Disc.Math.'91]. For $β= 1$, i.e., for the problem of computing a maximal independent set, our results improve on the previously best lower bound of $Ω(\log^* n)$ on trees, as our bounds already hold on trees.
△ Less
Submitted 2 June, 2022; v1 submitted 17 April, 2020;
originally announced April 2020.
-
Truly Tight-in-$Δ$ Bounds for Bipartite Maximal Matching and Variants
Authors:
Sebastian Brandt,
Dennis Olivetti
Abstract:
In a recent breakthrough result, Balliu et al. [FOCS'19] proved a deterministic $Ω(\min(Δ,\log n /\log \log n))$-round and a randomized $Ω(\min(Δ,\log \log n/\log \log \log n))$-round lower bound for the complexity of the bipartite maximal matching problem on $n$-node graphs in the LOCAL model of distributed computing.
Both lower bounds are asymptotically tight as a function of the maximum degre…
▽ More
In a recent breakthrough result, Balliu et al. [FOCS'19] proved a deterministic $Ω(\min(Δ,\log n /\log \log n))$-round and a randomized $Ω(\min(Δ,\log \log n/\log \log \log n))$-round lower bound for the complexity of the bipartite maximal matching problem on $n$-node graphs in the LOCAL model of distributed computing.
Both lower bounds are asymptotically tight as a function of the maximum degree $Δ$.
We provide truly tight bounds in $Δ$ for the complexity of bipartite maximal matching and many natural variants, up to and including the additive constant.
As a by-product, our results yield a considerably simplified version of the proof by Balliu et al.
We show that our results can be obtained via bounded automatic round elimination, a version of the recent automatic round elimination technique by Brandt [PODC'19] that is particularly suited for automatization from a practical perspective.
In this context, our work can be seen as another step towards the automatization of lower bounds in the LOCAL model.
△ Less
Submitted 19 February, 2020;
originally announced February 2020.
-
Classification of distributed binary labeling problems
Authors:
Alkida Balliu,
Sebastian Brandt,
Yuval Efron,
Juho Hirvonen,
Yannic Maus,
Dennis Olivetti,
Jukka Suomela
Abstract:
We present a complete classification of the deterministic distributed time complexity for a family of graph problems: binary labeling problems in trees. These are locally checkable problems that can be encoded with an alphabet of size two in the edge labeling formalism. Examples of binary labeling problems include sinkless orientation, sinkless and sourceless orientation, 2-vertex coloring, perfec…
▽ More
We present a complete classification of the deterministic distributed time complexity for a family of graph problems: binary labeling problems in trees. These are locally checkable problems that can be encoded with an alphabet of size two in the edge labeling formalism. Examples of binary labeling problems include sinkless orientation, sinkless and sourceless orientation, 2-vertex coloring, perfect matching, and the task of coloring edges red and blue such that all nodes are incident to at least one red and at least one blue edge. More generally, we can encode e.g. any cardinality constraints on indegrees and outdegrees.
We study the deterministic time complexity of solving a given binary labeling problem in trees, in the usual LOCAL model of distributed computing. We show that the complexity of any such problem is in one of the following classes: $O(1)$, $Θ(\log n)$, $Θ(n)$, or unsolvable. In particular, a problem that can be represented in the binary labeling formalism cannot have time complexity $Θ(\log^* n)$, and hence we know that e.g. any encoding of maximal matchings has to use at least three labels (which is tight).
Furthermore, given the description of any binary labeling problem, we can easily determine in which of the four classes it is and what is an asymptotically optimal algorithm for solving it. Hence the distributed time complexity of binary labeling problems is decidable, not only in principle, but also in practice: there is a simple and efficient algorithm that takes the description of a binary labeling problem and outputs its distributed time complexity.
△ Less
Submitted 18 February, 2020; v1 submitted 29 November, 2019;
originally announced November 2019.
-
Theory-Software Translation: Research Challenges and Future Directions
Authors:
Caroline Jay,
Robert Haines,
Daniel S. Katz,
Jeffrey Carver,
James C. Phillips,
Anshu Dubey,
Sandra Gesing,
Matthew Turk,
Hui Wan,
Hubertus van Dam,
James Howison,
Vitali Morozov,
Steven R. Brandt
Abstract:
The Theory-Software Translation Workshop, held in New Orleans in February 2019, explored in depth the process of both instantiating theory in software - for example, implementing a mathematical model in code as part of a simulation - and using the outputs of software - such as the behavior of a simulation - to advance knowledge. As computation within research is now ubiquitous, the workshop provid…
▽ More
The Theory-Software Translation Workshop, held in New Orleans in February 2019, explored in depth the process of both instantiating theory in software - for example, implementing a mathematical model in code as part of a simulation - and using the outputs of software - such as the behavior of a simulation - to advance knowledge. As computation within research is now ubiquitous, the workshop provided a timely opportunity to reflect on the particular challenges of research software engineering - the process of develo** and maintaining software for scientific discovery. In addition to the general challenges common to all software development projects, research software additionally must represent, manipulate, and provide data for complex theoretical constructs. Ensuring this process is robust is essential to maintaining the integrity of the science resulting from it, and the workshop highlighted a number of areas where the current approach to research software engineering would benefit from an evidence base that could be used to inform best practice.
The workshop brought together expert research software engineers and academics to discuss the challenges of Theory-Software Translation over a two-day period. This report provides an overview of the workshop activities, and a synthesises of the discussion that was recorded. The body of the report presents a thematic analysis of the challenges of Theory-Software Translation as identified by workshop participants, summarises these into a set of research areas, and provides recommendations for the future direction of this work.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
A Sharp Threshold Phenomenon for the Distributed Complexity of the Lovász Local Lemma
Authors:
Sebastian Brandt,
Yannic Maus,
Jara Uitto
Abstract:
The Lovász Local Lemma (LLL) says that, given a set of bad events that depend on the values of some random variables and where each event happens with probability at most $p$ and depends on at most $d$ other events, there is an assignment of the variables that avoids all bad events if the LLL criterion $ep(d+1)<1$ is satisfied.
In this paper, we study the dependency of the distributed complexity…
▽ More
The Lovász Local Lemma (LLL) says that, given a set of bad events that depend on the values of some random variables and where each event happens with probability at most $p$ and depends on at most $d$ other events, there is an assignment of the variables that avoids all bad events if the LLL criterion $ep(d+1)<1$ is satisfied.
In this paper, we study the dependency of the distributed complexity of the LLL problem on the chosen LLL criterion. We show that for the fundamental case of each random variable of the considered LLL instance being associated with an edge of the input graph, that is, each random variable influences at most two events, a sharp threshold phenomenon occurs at $p = 2^{-d}$: we provide a simple deterministic (!) algorithm that matches a known $Ω(\log^* n)$ lower bound in bounded degree graphs, if $p < 2^{-d}$, whereas for $p \geq 2^{-d}$, a known $Ω(\log \log n)$ randomized and a known $Ω(\log n)$ deterministic lower bounds hold.
In many applications variables affect more than two events; our main contribution is to extend our algorithm to the case where random variables influence at most three different bad events. We show that, surprisingly, the sharp threshold occurs at the exact same spot, providing evidence for our conjecture that this phenomenon always occurs at $p = 2^{-d}$, independent of the number $r$ of events that are affected by a variable. Almost all steps of the proof framework we provide for the case $r=3$ extend directly to the case of arbitrary $r$; consequently, our approach serves as a step towards characterizing the complexity of the LLL under different exponential criteria.
△ Less
Submitted 20 August, 2019; v1 submitted 17 August, 2019;
originally announced August 2019.
-
Evaluating the Portability of an NLP System for Processing Echocardiograms: A Retrospective, Multi-site Observational Study
Authors:
Prakash Adekkanattu,
Guoqian Jiang,
Yuan Luo,
Paul R. Kingsbury,
Zhenxing Xu,
Luke V. Rasmussen,
Jennifer A. Pacheco,
Richard C. Kiefer,
Daniel J. Stone,
Pascal S. Brandt,
Liang Yao,
Yizhen Zhong,
Yu Deng,
Fei Wang,
Jessica S. Ancker,
Thomas R. Campion,
Jyotishman Pathak
Abstract:
While natural language processing (NLP) of unstructured clinical narratives holds the potential for patient care and clinical research, portability of NLP approaches across multiple sites remains a major challenge. This study investigated the portability of an NLP system developed initially at the Department of Veterans Affairs (VA) to extract 27 key cardiac concepts from free-text or semi-structu…
▽ More
While natural language processing (NLP) of unstructured clinical narratives holds the potential for patient care and clinical research, portability of NLP approaches across multiple sites remains a major challenge. This study investigated the portability of an NLP system developed initially at the Department of Veterans Affairs (VA) to extract 27 key cardiac concepts from free-text or semi-structured echocardiograms from three academic medical centers: Weill Cornell Medicine, Mayo Clinic and Northwestern Medicine. While the NLP system showed high precision and recall measurements for four target concepts (aortic valve regurgitation, left atrium size at end systole, mitral valve regurgitation, tricuspid valve regurgitation) across all sites, we found moderate or poor results for the remaining concepts and the NLP system performance varied between individual sites.
△ Less
Submitted 1 April, 2019;
originally announced May 2019.
-
Non-Rigid Structure-From-Motion by Rank-One Basis Shapes
Authors:
Sami S. Brandt,
Hanno Ackermann
Abstract:
In this paper, we show that the affine, non-rigid structure-from-motion problem can be solved by rank-one, thus degenerate, basis shapes. It is a natural reformulation of the classic low-rank method by Bregler et al., where it was assumed that the deformable 3D structure is generated by a linear combination of rigid basis shapes. The non-rigid shape will be decomposed into the mean shape and the d…
▽ More
In this paper, we show that the affine, non-rigid structure-from-motion problem can be solved by rank-one, thus degenerate, basis shapes. It is a natural reformulation of the classic low-rank method by Bregler et al., where it was assumed that the deformable 3D structure is generated by a linear combination of rigid basis shapes. The non-rigid shape will be decomposed into the mean shape and the degenerate shapes, constructed from the right singular vectors of the low-rank decomposition. The right singular vectors are affinely back-projected into the 3D space, and the affine back-projections will also be solved as part of the factorisation. By construction, a direct interpretation for the right singular vectors of the low-rank decomposition will also follow: they can be seen as principal components, hence, the first variant of our method is referred to as Rank-1-PCA. The second variant, referred to as Rank-1-ICA, additionally estimates the orthogonal transform which maps the deformation modes into as statistically independent modes as possible. It has the advantage of pinpointing statistically dependent subspaces related to, for instance, lip movements on human faces. Moreover, in contrast to prior works, no predefined dimensionality for the subspaces is imposed. The experiments on several datasets show that the method achieves better results than the state-of-the-art, it can be computed faster, and it provides an intuitive interpretation for the deformation modes.
△ Less
Submitted 30 April, 2019;
originally announced April 2019.
-
Rendering of Complex Heterogenous Scenes using Progressive Blue Surfels
Authors:
Sascha Brandt,
Claudius Jähn,
Matthias Fischer,
Friedhelm Meyer auf der Heide
Abstract:
We present a technique for rendering highly complex 3D scenes in real-time by generating uniformly distributed points on the scene's visible surfaces. The technique is applicable to a wide range of scene types, like scenes directly based on complex and detailed CAD data consisting of billions of polygons (in contrast to scenes handcrafted solely for visualization). This allows to visualize such sc…
▽ More
We present a technique for rendering highly complex 3D scenes in real-time by generating uniformly distributed points on the scene's visible surfaces. The technique is applicable to a wide range of scene types, like scenes directly based on complex and detailed CAD data consisting of billions of polygons (in contrast to scenes handcrafted solely for visualization). This allows to visualize such scenes smoothly even in VR on a HMD with good image quality, while maintaining the necessary frame-rates. In contrast to other point based rendering methods, we place points in an approximated blue noise distribution only on visible surfaces and store them in a highly GPU efficient data structure, allowing to progressively refine the number of rendered points to maximize the image quality for a given target frame rate. Our evaluation shows that scenes consisting of a high amount of polygons can be rendered with interactive frame rates with good visual quality on standard hardware.
△ Less
Submitted 17 April, 2019;
originally announced April 2019.
-
Online Graph Exploration on a Restricted Graph Class: Optimal Solutions for Tadpole Graphs
Authors:
Sebastian Brandt,
Klaus-Tycho Foerster,
Jonathan Maurer,
Roger Wattenhofer
Abstract:
We study the problem of online graph exploration on undirected graphs, where a searcher has to visit every vertex and return to the origin. Once a new vertex is visited, the searcher learns of all neighboring vertices and the connecting edge weights. The goal such an exploration is to minimize its total cost, where each edge traversal incurs a cost of the corresponding edge weight. We investigate…
▽ More
We study the problem of online graph exploration on undirected graphs, where a searcher has to visit every vertex and return to the origin. Once a new vertex is visited, the searcher learns of all neighboring vertices and the connecting edge weights. The goal such an exploration is to minimize its total cost, where each edge traversal incurs a cost of the corresponding edge weight. We investigate the problem on tadpole graphs (also known as dragons, kites), which consist of a cycle with an attached path. Miyazaki et al. (The online graph exploration problem on restricted graphs, IEICE Transactions 92-D (9), 2009) showed that every online algorithm on these graphs must have a competitive ratio of 2-epsilon, but did not provide upper bounds for non-unit edge weights. We show via amortized analysis that a greedy approach yields a matching competitive ratio of 2 on tadpole graphs, for arbitrary non-negative edge weights.
△ Less
Submitted 18 April, 2020; v1 submitted 1 March, 2019;
originally announced March 2019.
-
An Automatic Speedup Theorem for Distributed Problems
Authors:
Sebastian Brandt
Abstract:
Recently, Brandt et al. [STOC'16] proved a lower bound for the distributed Lovász Local Lemma, which has been conjectured to be tight for sufficiently relaxed LLL criteria by Chang and Pettie [FOCS'17]. At the heart of their result lies a speedup technique that, for graphs of girth at least $2t+2$, transforms any $t$-round algorithm for one specific LLL problem into a $(t-1)$-round algorithm for t…
▽ More
Recently, Brandt et al. [STOC'16] proved a lower bound for the distributed Lovász Local Lemma, which has been conjectured to be tight for sufficiently relaxed LLL criteria by Chang and Pettie [FOCS'17]. At the heart of their result lies a speedup technique that, for graphs of girth at least $2t+2$, transforms any $t$-round algorithm for one specific LLL problem into a $(t-1)$-round algorithm for the same problem. We substantially improve on this technique by showing that such a speedup exists for any locally checkable problem $Π$, with the difference that the problem $Π_1$ the inferred $(t-1)$-round algorithm solves is not (necessarily) the same problem as $Π$. Our speedup is automatic in the sense that there is a fixed procedure that transforms a description for $Π$ into a description for $Π_1$ and reversible in the sense that any $(t-1)$-round algorithm for $Π_1$ can be transformed into a $t$-round algorithm for $Π$. In particular, for any locally checkable problem $Π$ with exact deterministic time complexity $T(n, Δ) \leq t$ on graphs with $n$ nodes, maximum node degree $Δ$, and girth at least $2t+2$, there is a sequence of problems $Π_1, Π_2, \dots$ with time complexities $T(n, Δ)-1, T(n, Δ)-2, \dots$, that can be inferred from $Π$.
As a first application of our generalized speedup, we solve a long-standing open problem of Naor and Stockmeyer [STOC'93]: we show that weak $2$-coloring in odd-degree graphs cannot be solved in $o(\log^* Δ)$ rounds, thereby providing a matching lower bound to their upper bound.
△ Less
Submitted 26 February, 2019;
originally announced February 2019.
-
How much does randomness help with locally checkable problems?
Authors:
Alkida Balliu,
Sebastian Brandt,
Dennis Olivetti,
Jukka Suomela
Abstract:
Locally checkable labeling problems (LCLs) are distributed graph problems in which a solution is globally feasible if it is locally feasible in all constant-radius neighborhoods. Vertex colorings, maximal independent sets, and maximal matchings are examples of LCLs.
On the one hand, it is known that some LCLs benefit exponentially from randomness---for example, any deterministic distributed algo…
▽ More
Locally checkable labeling problems (LCLs) are distributed graph problems in which a solution is globally feasible if it is locally feasible in all constant-radius neighborhoods. Vertex colorings, maximal independent sets, and maximal matchings are examples of LCLs.
On the one hand, it is known that some LCLs benefit exponentially from randomness---for example, any deterministic distributed algorithm that finds a sinkless orientation requires $Θ(\log n)$ rounds in the LOCAL model, while the randomized complexity of the problem is $Θ(\log \log n)$ rounds. On the other hand, there are also many LCLs in which randomness is useless.
Previously, it was not known if there are any LCLs that benefit from randomness, but only subexponentially. We show that such problems exist: for example, there is an LCL with deterministic complexity $Θ(\log^2 n)$ rounds and randomized complexity $Θ(\log n \log \log n)$ rounds.
△ Less
Submitted 18 February, 2020; v1 submitted 18 February, 2019;
originally announced February 2019.
-
Lower bounds for maximal matchings and maximal independent sets
Authors:
Alkida Balliu,
Sebastian Brandt,
Juho Hirvonen,
Dennis Olivetti,
Mikaël Rabie,
Jukka Suomela
Abstract:
There are distributed graph algorithms for finding maximal matchings and maximal independent sets in $O(Δ+ \log^* n)$ communication rounds; here $n$ is the number of nodes and $Δ$ is the maximum degree. The lower bound by Linial (1987, 1992) shows that the dependency on $n$ is optimal: these problems cannot be solved in $o(\log^* n)$ rounds even if $Δ= 2$. However, the dependency on $Δ$ is a long-…
▽ More
There are distributed graph algorithms for finding maximal matchings and maximal independent sets in $O(Δ+ \log^* n)$ communication rounds; here $n$ is the number of nodes and $Δ$ is the maximum degree. The lower bound by Linial (1987, 1992) shows that the dependency on $n$ is optimal: these problems cannot be solved in $o(\log^* n)$ rounds even if $Δ= 2$. However, the dependency on $Δ$ is a long-standing open question, and there is currently an exponential gap between the upper and lower bounds.
We prove that the upper bounds are tight. We show that any algorithm that finds a maximal matching or maximal independent set with probability at least $1-1/n$ requires $Ω(\min\{Δ,\log \log n / \log \log \log n\})$ rounds in the LOCAL model of distributed computing. As a corollary, it follows that any deterministic algorithm that finds a maximal matching or maximal independent set requires $Ω(\min\{Δ, \log n / \log \log n\})$ rounds; this is an improvement over prior lower bounds also as a function of $n$.
△ Less
Submitted 10 December, 2021; v1 submitted 8 January, 2019;
originally announced January 2019.
-
Integral Geometric Dual Distributions of Multilinear Models
Authors:
Sami Sebastian Brandt
Abstract:
We propose an integral geometric approach for computing dual distributions for the parameter distributions of multilinear models. The dual distributions can be computed from, for example, the parameter distributions of conics, multiple view tensors, homographies, or as simple entities as points, lines, and planes. The dual distributions have analytical forms that follow from the asymptotic normali…
▽ More
We propose an integral geometric approach for computing dual distributions for the parameter distributions of multilinear models. The dual distributions can be computed from, for example, the parameter distributions of conics, multiple view tensors, homographies, or as simple entities as points, lines, and planes. The dual distributions have analytical forms that follow from the asymptotic normality property of the maximum likelihood estimator and an application of integral transforms, fundamentally the generalised Radon transforms, on the probability density of the parameters. The approach allows us, for instance, to look at the uncertainty distributions in feature distributions, which are essentially tied to the distribution of training data, and helps us to derive conditional distributions for interesting variables and characterise confidence intervals of the estimates.
△ Less
Submitted 22 November, 2018;
originally announced December 2018.
-
Uncalibrated Non-Rigid Factorisation by Independent Subspace Analysis
Authors:
Sami Sebastian Brandt,
Hanno Ackermann,
Stella Grasshof
Abstract:
We propose a general, prior-free approach for the uncalibrated non-rigid structure-from-motion problem for modelling and analysis of non-rigid objects such as human faces. The word general refers to an approach that recovers the non-rigid affine structure and motion from 2D point correspondences by assuming that (1) the non-rigid shapes are generated by a linear combination of rigid 3D basis shape…
▽ More
We propose a general, prior-free approach for the uncalibrated non-rigid structure-from-motion problem for modelling and analysis of non-rigid objects such as human faces. The word general refers to an approach that recovers the non-rigid affine structure and motion from 2D point correspondences by assuming that (1) the non-rigid shapes are generated by a linear combination of rigid 3D basis shapes, (2) that the non-rigid shapes are affine in nature, i.e., they can be modelled as deviations from the mean, rigid shape, (3) and that the basis shapes are statistically independent. In contrast to the majority of existing works, no prior information is assumed for the structure and motion apart from the assumption the that underlying basis shapes are statistically independent. The independent 3D shape bases are recovered by independent subspace analysis (ISA). Likewise, in contrast to the most previous approaches, no calibration information is assumed for affine cameras; the reconstruction is solved up to a global affine ambiguity that makes our approach simple but efficient. In the experiments, we evaluated the method with several standard data sets including a real face expression data set of 7200 faces with 2D point correspondences and unknown 3D structure and motion for which we obtained promising results.
△ Less
Submitted 22 November, 2018;
originally announced November 2018.