-
Parallel approximation of the exponential of Hermitian matrices
Authors:
Frédéric Hecht,
Sidi-Mahmoud Kaber,
Lucas Perrin,
Alain Plagne,
Julien Salomon
Abstract:
In this work, we consider a rational approximation of the exponential function to design an algorithm for computing matrix exponential in the Hermitian case. Using partial fraction decomposition, we obtain a parallelizable method, where the computation reduces to independent resolutions of linear systems. We analyze the effects of rounding errors on the accuracy of our algorithm. We complete this…
▽ More
In this work, we consider a rational approximation of the exponential function to design an algorithm for computing matrix exponential in the Hermitian case. Using partial fraction decomposition, we obtain a parallelizable method, where the computation reduces to independent resolutions of linear systems. We analyze the effects of rounding errors on the accuracy of our algorithm. We complete this work with numerical tests showing the efficiency of our method and a comparison of its performances with Krylov algorithms.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
Microwave Tomographic Imaging of Cerebrovascular Accidents by Using High-Performance Computing
Authors:
P. -H. Tournier,
I. Aliferis,
M. Bonazzoli,
M. de Buhan,
M. Darbas,
V. Dolean,
F. Hecht,
P. Jolivet,
I. El Kanfoud,
C. Migliaccio,
F. Nataf,
C. Pichot,
S. Semenov
Abstract:
The motivation of this work is the detection of cerebrovascular accidents by microwave tomographic imaging. This requires the solution of an inverse problem relying on a minimization algorithm (for example, gradient-based), where successive iterations consist in repeated solutions of a direct problem. The reconstruction algorithm is extremely computationally intensive and makes use of efficient pa…
▽ More
The motivation of this work is the detection of cerebrovascular accidents by microwave tomographic imaging. This requires the solution of an inverse problem relying on a minimization algorithm (for example, gradient-based), where successive iterations consist in repeated solutions of a direct problem. The reconstruction algorithm is extremely computationally intensive and makes use of efficient parallel algorithms and high-performance computing. The feasibility of this type of imaging is conditioned on one hand by an accurate reconstruction of the material properties of the propagation medium and on the other hand by a considerable reduction in simulation time. Fulfilling these two requirements will enable a very rapid and accurate diagnosis. From the mathematical and numerical point of view, this means solving Maxwell's equations in time-harmonic regime by appropriate domain decomposition methods, which are naturally adapted to parallel architectures.
△ Less
Submitted 19 March, 2020; v1 submitted 9 July, 2016;
originally announced July 2016.
-
Bypassing Cloud Providers' Data Validation to Store Arbitrary Data
Authors:
Guilherme Sperb Machado,
Fabio Hecht,
Martin Waldburger,
Burkhard Stiller
Abstract:
A fundamental Software-as-a-Service (SaaS) characteristic in Cloud Computing is to be application-specific; depending on the application, Cloud Providers (CPs) restrict data formats and attributes allowed into their servers via a data validation process. An ill-defined data validation process may directly impact both security (e.g. application failure, legal issues) and accounting and charging (e.…
▽ More
A fundamental Software-as-a-Service (SaaS) characteristic in Cloud Computing is to be application-specific; depending on the application, Cloud Providers (CPs) restrict data formats and attributes allowed into their servers via a data validation process. An ill-defined data validation process may directly impact both security (e.g. application failure, legal issues) and accounting and charging (e.g. trusting metadata in file headers). Therefore, this paper investigates, evaluates (by means of tests), and discusses data validation processes of popular CPs. A proof of concept system was thus built, implementing encoders carefully crafted to circumvent data validation processes, ultimately demonstrating how large amounts of unaccounted, arbitrary data can be stored into CPs.
△ Less
Submitted 9 April, 2014;
originally announced April 2014.