Skip to main content

Showing 1–20 of 20 results for author: Conway, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.10253  [pdf, other

    cs.DS

    Adaptive Quotient Filters

    Authors: Richard Wen, Hunter McCoy, David Tench, Guido Tagliavini, Michael A. Bender, Alex Conway, Martin Farach-Colton, Rob Johnson, Prashant Pandey

    Abstract: Adaptive filters, such as telesco** and adaptive cuckoo filters, update their representation upon detecting a false positive to avoid repeating the same error in the future. Adaptive filters require an auxiliary structure, typically much larger than the main filter and often residing on slow storage, to facilitate adaptation. However, existing adaptive filters are not practical and have seen no… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  2. arXiv:2405.00807  [pdf, ps, other

    cs.DS

    Nearly Optimal List Labeling

    Authors: Michael A. Bender, Alex Conway, Martín Farach-Colton, Hanna Komlós, Michal Koucký, William Kuszmaul, Michael Saks

    Abstract: The list-labeling problem captures the basic task of storing a dynamically changing set of up to $n$ elements in sorted order in an array of size $m = (1 + Θ(1))n$. The goal is to support insertions and deletions while moving around elements within the array as little as possible. Until recently, the best known upper bound stood at $O(\log^2 n)$ amortized cost. This bound, which was first establ… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 39 pages

  3. arXiv:2404.16623  [pdf, other

    cs.DS

    Layered List Labeling

    Authors: Michael A. Bender, Alex Conway, Martin Farach-Colton, Hanna Komlos, William Kuszmaul

    Abstract: The list-labeling problem is one of the most basic and well-studied algorithmic primitives in data structures, with an extensive literature spanning upper bounds, lower bounds, and data management applications. The classical algorithm for this problem, dating back to 1981, has amortized cost $O(\log^2 n)$. Subsequent work has led to improvements in three directions: \emph{low-latency} (worst-case)… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: PODS 2024, 19 pages, 4 figures

  4. arXiv:2401.08858  [pdf, ps, other

    cs.OS

    File System Aging

    Authors: Alex Conway, Ainesh Bakshi, Arghya Bhattacharya, Rory Bennett, Yizheng Jiao, Eric Knorr, Yang Zhan, Michael A. Bender, William Jannen, Rob Johnson, Bradley C. Kuszmaul, Donald E. Porter, Jun Yuan, Martin Farach-Colton

    Abstract: File systems must allocate space for files without knowing what will be added or removed in the future. Over the life of a file system, this may cause suboptimal file placement decisions that eventually lead to slower performance, or aging. Conventional wisdom suggests that file system aging is a solved problem in the common case; heuristics to avoid aging, such as colocating related files and dat… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: 36 pages, 12 figures. Article is an extension of Conway et al. FAST 17. (see https://www.usenix.org/conference/fast17/technical-sessions/presentation/conway) and Conway et al. HotStorage 19. (see https://www.usenix.org/conference/hotstorage19/presentation/conway)

    ACM Class: H.3.2; D.4.3; D.4.2; D.4.8; E.1; E.5; H.3.4

  5. arXiv:2306.12682  [pdf, other

    math.CO cs.DS

    Counting occurrences of patterns in permutations

    Authors: Andrew R Conway, Anthony J Guttmann

    Abstract: We develop a new, powerful method for counting elements in a multiset. As a first application, we use this algorithm to study the number of occurrences of patterns in a permutation. For patterns of length 3 there are two Wilf classes, and the general behaviour of these is reasonably well-known. We slightly extend some of the known results in that case, and exhaustively study the case of patterns o… ▽ More

    Submitted 4 March, 2024; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: 32 pages. Updated references from previous version. Removal on earlier discussion of Stieltjes sequences, which was incomplete and confusing

    MSC Class: 05A15 (Primary) 05A05; 06-04 (Secondary)

  6. arXiv:2306.10062  [pdf, other

    cs.CL cs.AI cs.LG

    Revealing the structure of language model capabilities

    Authors: Ryan Burnell, Han Hao, Andrew R. A. Conway, Jose Hernandez Orallo

    Abstract: Building a theoretical understanding of the capabilities of large language models (LLMs) is vital for our ability to predict and explain the behavior of these systems. Here, we investigate the structure of LLM capabilities by extracting latent capabilities from patterns of individual differences across a varied population of LLMs. Using a combination of Bayesian and frequentist factor analysis, we… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

    Comments: 10 pages, 3 figures + references and appendices, for data and analysis code see https://github.com/RyanBurnell/revealing-LLM-capabilities

  7. arXiv:2211.06694  [pdf, other

    cs.CV cs.LG

    Pain Detection in Masked Faces during Procedural Sedation

    Authors: Y. Zarghami, S. Mafeld, A. Conway, B. Taati

    Abstract: Pain monitoring is essential to the quality of care for patients undergoing a medical procedure with sedation. An automated mechanism for detecting pain could improve sedation dose titration. Previous studies on facial pain detection have shown the viability of computer vision methods in detecting pain in unoccluded faces. However, the faces of patients undergoing procedures are often partially oc… ▽ More

    Submitted 12 November, 2022; originally announced November 2022.

    Comments: Accepted for presentation at the FG2023 workshop on Artificial Intelligence for Automated Human Health-care and Monitoring: 6 pages, 10 figures

  8. arXiv:2210.04068  [pdf, other

    cs.DS cs.DB

    IcebergHT: High Performance PMEM Hash Tables Through Stability and Low Associativity

    Authors: Prashant Pandey, Michael A. Bender, Alex Conway, Martín Farach-Colton, William Kuszmaul, Guido Tagliavini, Rob Johnson

    Abstract: Modern hash table designs strive to minimize space while maximizing speed. The most important factor in speed is the number of cache lines accessed during updates and queries. This is especially important on PMEM, which is slower than DRAM and in which writes are more expensive than reads. This paper proposes two stronger design objectives: stability and low-associativity. A stable hash table do… ▽ More

    Submitted 11 October, 2022; v1 submitted 8 October, 2022; originally announced October 2022.

  9. arXiv:2203.02763  [pdf, ps, other

    cs.DS

    Online List Labeling: Breaking the $\log^2n$ Barrier

    Authors: Michael A. Bender, Alex Conway, Martín Farach-Colton, Hanna Komlós, William Kuszmaul, Nicole Wein

    Abstract: The online list labeling problem is an algorithmic primitive with a large literature of upper bounds, lower bounds, and applications. The goal is to store a dynamically-changing set of $n$ items in an array of $m$ slots, while maintaining the invariant that the items appear in sorted order, and while minimizing the relabeling cost, defined to be the number of items that are moved per insertion/del… ▽ More

    Submitted 12 September, 2022; v1 submitted 5 March, 2022; originally announced March 2022.

    Comments: Full version for FOCS 2022 camera ready

  10. arXiv:2111.12800  [pdf, other

    cs.DS

    Tiny Pointers

    Authors: Michael A. Bender, Alex Conway, Martín Farach-Colton, William Kuszmaul, Guido Tagliavini

    Abstract: This paper introduces a new data-structural object that we call the tiny pointer. In many applications, traditional $\log n $-bit pointers can be replaced with $o (\log n )$-bit tiny pointers at the cost of only a constant-factor time overhead. We develop a comprehensive theory of tiny pointers, and give optimal constructions for both fixed-size tiny pointers (i.e., settings in which all of the ti… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  11. arXiv:2109.04548  [pdf, other

    cs.DS

    Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once

    Authors: Michael A. Bender, Alex Conway, Martín Farach-Colton, William Kuszmaul, Guido Tagliavini

    Abstract: Despite being one of the oldest data structures in computer science, hash tables continue to be the focus of a great deal of both theoretical and empirical research. A central reason for this is that many of the fundamental properties that one desires from a hash table are difficult to achieve simultaneously; thus many variants offering different trade-offs have been proposed. This paper introdu… ▽ More

    Submitted 22 October, 2023; v1 submitted 9 September, 2021; originally announced September 2021.

  12. Random errors are not necessarily politically neutral

    Authors: Michelle Blom, Andrew Conway, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic

    Abstract: Errors are inevitable in the implementation of any complex process. Here we examine the effect of random errors on Single Transferable Vote (STV) elections, a common approach to deciding multi-seat elections. It is usually expected that random errors should have nearly equal effects on all candidates, and thus be fair. We find to the contrary that random errors can introduce systematic bias into e… ▽ More

    Submitted 28 September, 2020; v1 submitted 1 July, 2020; originally announced July 2020.

    Journal ref: Electronic Voting, E-Vote-ID 2020, Lecture Notes in Computer Science 12455 (2020) 19-35

  13. arXiv:2004.00235  [pdf, other

    cs.CY cs.AI

    You can do RLAs for IRV

    Authors: Michelle Blom, Andrew Conway, Dan King, Laurent Sandrolini, Philip B. Stark, Peter J. Stuckey, Vanessa Teague

    Abstract: The City and County of San Francisco, CA, has used Instant Runoff Voting (IRV) for some elections since 2004. This report describes the first ever process pilot of Risk Limiting Audits for IRV, for the San Francisco District Attorney's race in November, 2019. We found that the vote-by-mail outcome could be efficiently audited to well under the 0.05 risk limit given a sample of only 200 ballots. Al… ▽ More

    Submitted 1 April, 2020; originally announced April 2020.

  14. arXiv:1901.03108  [pdf, ps, other

    cs.CR

    Auditing Indian Elections

    Authors: Vishal Mohanty, Nicholas Akinyokun, Andrew Conway, Chris Culnane, Philip B. Stark, Vanessa Teague

    Abstract: Indian Electronic Voting Machines (EVMs) will be fitted with printers that produce Voter-Verifiable Paper Audit Trails (VVPATs) in time for the 2019 general election. VVPATs provide evidence that each vote was recorded as the voter intended, without having to trust the perfection or security of the EVMs. However, confidence in election results requires more: VVPATs must be preserved inviolate an… ▽ More

    Submitted 25 January, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

  15. arXiv:1807.01804  [pdf, other

    cs.DS

    Optimal Ball Recycling

    Authors: Michael A. Bender, Jake Christensen, Alex Conway, Martín Farach-Colton, Rob Johnson, Meng-Tsung Tsai

    Abstract: Balls-and-bins games have been a wildly successful tool for modeling load balancing problems. In this paper, we study a new scenario, which we call the ball recycling game, defined as follows: Throw m balls into n bins i.i.d. according to a given probability distribution p. Then, at each time step, pick a non-empty bin and recycle its balls: take the balls from the selected bin and re-throw them… ▽ More

    Submitted 2 November, 2018; v1 submitted 4 July, 2018; originally announced July 2018.

  16. arXiv:1805.09423  [pdf, ps, other

    cs.DS

    Optimal Hashing in External Memory

    Authors: Alex Conway, Martin Farach-Colton, Philip Shilane

    Abstract: Hash tables are a ubiquitous class of dictionary data structures. However, standard hash table implementations do not translate well into the external memory model, because they do not incorporate locality for insertions. Iacono and Patracsu established an update/query tradeoff curve for external hash tables: a hash table that performs insertions in $O(λ/B)$ amortized IOs requires $Ω(\log_λN)$ e… ▽ More

    Submitted 23 May, 2018; originally announced May 2018.

  17. An analysis of New South Wales electronic vote counting

    Authors: Andrew Conway, Michelle Blom, Lee Naish, Vanessa Teague

    Abstract: We re-examine the 2012 local government elections in New South Wales, Australia. The count was conducted electronically using a randomised form of the Single Transferable Vote (STV). It was already well known that randomness does make a difference to outcomes in some seats. We describe how the process could be amended to include a demonstration that the randomness was chosen fairly. Second, and… ▽ More

    Submitted 7 November, 2016; originally announced November 2016.

  18. arXiv:1610.09806  [pdf, other

    math.CO cs.DS

    The design of efficient algorithms for enumeration

    Authors: Andrew R. Conway

    Abstract: Many algorithms have been developed for enumerating various combinatorial objects in time exponentially less than the number of objects. Two common classes of algorithms are dynamic programming and the transfer matrix method. This paper covers the design and implementation of such algorithms. A host of general techniques for improving efficiency are described. Three quite different example probl… ▽ More

    Submitted 15 May, 2017; v1 submitted 31 October, 2016; originally announced October 2016.

  19. arXiv:1610.00127  [pdf, ps, other

    cs.CR cs.CY

    Auditing Australian Senate Ballots

    Authors: Berj Chilingirian, Zara Perumal, Ronald L. Rivest, Grahame Bowland, Andrew Conway, Philip B. Stark, Michelle Blom, Chris Culnane, Vanessa Teague

    Abstract: We explain why the Australian Electoral Commission should perform an audit of the paper Senate ballots against the published preference data files. We suggest four different post-election audit methods appropriate for Australian Senate elections. We have developed prototype code for all of them and tested it on preference data from the 2016 election.

    Submitted 1 October, 2016; originally announced October 2016.

  20. arXiv:1405.6802  [pdf, other

    math.CO cs.DS math-ph

    On the growth rate of 1324-avoiding permutations

    Authors: Andrew R Conway, Anthony J Guttmann

    Abstract: We give an improved algorithm for counting the number of $1324$-avoiding permutations, resulting in 5 further terms of the generating function. We analyse the known coefficients and find compelling evidence that unlike other classical length-4 pattern-avoiding permutations, the generating function in this case does not have an algebraic singularity. Rather, the number of 1324-avoiding permutations… ▽ More

    Submitted 27 May, 2014; originally announced May 2014.

    Comments: 20 pages, 10 figures

    MSC Class: 05A05; 05A15; 05A16