Skip to main content

Showing 1–9 of 9 results for author: Gill, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07079  [pdf, other

    cs.SE

    Host-Based Allocators for Device Memory

    Authors: Oren Bell, Ashwin Kumar, Chris Gill

    Abstract: Memory allocation is a fairly mature field of computer science. However, we challenge a prevailing assumption in the literature over the last 50 years which, if reconsidered, necessitates a fundamental reevaluation of many classical memory management algorithms. We pose a model where the allocation algorithm runs on host memory but allocates device memory and so incur the following constraint: the… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: 9 pages, 4 figures

  2. arXiv:2304.04677  [pdf

    cs.AI cs.CY

    Artificial Intelligence/Operations Research Workshop 2 Report Out

    Authors: John Dickerson, Bistra Dilkina, Yu Ding, Swati Gupta, Pascal Van Hentenryck, Sven Koenig, Ramayya Krishnan, Radhika Kulkarni, Catherine Gill, Haley Griffin, Maddy Hunter, Ann Schwartz

    Abstract: This workshop Report Out focuses on the foundational elements of trustworthy AI and OR technology, and how to ensure all AI and OR systems implement these elements in their system designs. Four sessions on various topics within Trustworthy AI were held, these being Fairness, Explainable AI/Causality, Robustness/Privacy, and Human Alignment and Human-Computer Interaction. Following discussions of e… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

  3. arXiv:2209.03540  [pdf, other

    cs.LG cs.AI cs.CR

    Reward Delay Attacks on Deep Reinforcement Learning

    Authors: Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher Gill, Ning Zhang

    Abstract: Most reinforcement learning algorithms implicitly assume strong synchrony. We present novel attacks targeting Q-learning that exploit a vulnerability entailed by this assumption by delaying the reward signal for a limited time period. We consider two types of attack goals: targeted attacks, which aim to cause a target policy to be learned, and untargeted attacks, which simply aim to induce a polic… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 20 pages, 9 figures, Conference on Decision and Game Theory for Security

  4. arXiv:2101.10463  [pdf, other

    cs.DC cs.AI cs.AR cs.GR

    RTGPU: Real-Time GPU Scheduling of Hard Deadline Parallel Tasks with Fine-Grain Utilization

    Authors: An Zou, **g Li, Christopher D. Gill, Xuan Zhang

    Abstract: Many emerging cyber-physical systems, such as autonomous vehicles and robots, rely heavily on artificial intelligence and machine learning algorithms to perform important system operations. Since these highly parallel applications are computationally intensive, they need to be accelerated by graphics processing units (GPUs) to meet stringent timing constraints. However, despite the wide adoption o… ▽ More

    Submitted 6 February, 2023; v1 submitted 25 January, 2021; originally announced January 2021.

  5. arXiv:2101.05865  [pdf, other

    cs.NI

    Impact of Distributed Rate Limiting on Load Distribution in a Latency-sensitive Messaging Service

    Authors: Chong Li, Jiangnan Liu, Chenyang Lu, Roch Guerin, Christopher D. Gill

    Abstract: The cloud's flexibility and promise of seamless auto-scaling notwithstanding, its ability to meet service level objectives (SLOs) typically calls for some form of control in resource usage. This seemingly traditional problem gives rise to new challenges in a cloud setting, and in particular a subtle yet significant trade-off involving load-distribution decisions (the distribution of workload acros… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

  6. arXiv:1910.01907  [pdf, other

    cs.LG cs.CV cs.RO stat.ML

    Attacking Vision-based Perception in End-to-End Autonomous Driving Models

    Authors: Adith Boloor, Karthik Garimella, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang

    Abstract: Recent advances in machine learning, especially techniques such as deep neural networks, are enabling a range of emerging applications. One such example is autonomous driving, which often relies on deep learning for perception. However, deep learning-based perception has been shown to be vulnerable to a host of subtle adversarial manipulations of images. Nevertheless, the vast majority of such dem… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: under review in the Journal of Systems Architecture 2019. arXiv admin note: substantial text overlap with arXiv:1903.05157

  7. arXiv:1905.05119  [pdf, other

    cs.DC

    Analysis of Global Fixed-Priority Scheduling for Generalized Sporadic DAG Tasks

    Authors: Son Dinh, Christopher Gill, Kunal Agrawal

    Abstract: We consider global fixed-priority (G-FP) scheduling of parallel tasks, in which each task is represented as a directed acyclic graph (DAG). We summarize and highlight limitations of the state-of-the-art analyses for G-FP and propose a novel technique for bounding interfering workload, which can be applied directly to generalized DAG tasks. Our technique works by constructing optimization problems… ▽ More

    Submitted 13 May, 2019; originally announced May 2019.

    Comments: real-time systems, parallel DAG tasks, G-FP scheduling

  8. arXiv:1903.05157  [pdf, other

    cs.RO cs.LG stat.ML

    Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models

    Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang

    Abstract: Recent advances in machine learning, especially techniques such as deep neural networks, are promoting a range of high-stakes applications, including autonomous driving, which often relies on deep learning for perception. While deep learning for perception has been shown to be vulnerable to a host of subtle adversarial manipulations of images, end-to-end demonstrations of successful attacks, which… ▽ More

    Submitted 12 March, 2019; originally announced March 2019.

  9. arXiv:1203.3481  [pdf

    cs.LG cs.AI stat.ML

    Real-Time Scheduling via Reinforcement Learning

    Authors: Robert Glaubius, Terry Tidwell, Christopher Gill, William D. Smart

    Abstract: Cyber-physical systems, such as mobile robots, must respond adaptively to dynamic operating conditions. Effective operation of these systems requires that sensing and actuation tasks are performed in a timely manner. Additionally, execution of mission specific tasks such as imaging a room must be balanced against the need to perform more general tasks such as obstacle avoidance. This problem has b… ▽ More

    Submitted 15 March, 2012; originally announced March 2012.

    Comments: Appears in Proceedings of the Twenty-Sixth Conference on Uncertainty in Artificial Intelligence (UAI2010)

    Report number: UAI-P-2010-PG-201-209