-
Experiences Building an MLIR-based SYCL Compiler
Authors:
Ettore Tiotto,
Víctor Pérez,
Whitney Tsang,
Lukas Sommer,
Julian Oppermann,
Victor Lomüller,
Mehdi Goli,
James Brodman
Abstract:
Similar to other programming models, compilers for SYCL, the open programming model for heterogeneous computing based on C++, would benefit from access to higher-level intermediate representations. The loss of high-level structure and semantics caused by premature lowering to low-level intermediate representations and the inability to reason about host and device code simultaneously present major…
▽ More
Similar to other programming models, compilers for SYCL, the open programming model for heterogeneous computing based on C++, would benefit from access to higher-level intermediate representations. The loss of high-level structure and semantics caused by premature lowering to low-level intermediate representations and the inability to reason about host and device code simultaneously present major challenges for SYCL compilers. The MLIR compiler framework, through its dialect mechanism, allows to model domain-specific, high-level intermediate representations and provides the necessary facilities to address these challenges. This work therefore describes practical experience with the design and implementation of an MLIR-based SYCL compiler. By modeling key elements of the SYCL programming model in host and device code in the MLIR dialect framework, the presented approach enables the implementation of powerful device code optimizations as well as analyses across host and device code. Compared to two LLVM-based SYCL implementations, this yields speedups of up to 4.3x on a collection of SYCL benchmark applications. Finally, this work also discusses challenges encountered in the design and implementation and how these could be addressed in the future.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
The ATLAS EventIndex: a BigData catalogue for all ATLAS experiment events
Authors:
Dario Barberis,
Igor Aleksandrov,
Evgeny Alexandrov,
Zbigniew Baranowski,
Luca Canali,
Elizaveta Cherepanova,
Gancho Dimitrov,
Andrea Favareto,
Alvaro Fernandez Casani,
Elizabeth J. Gallas,
Carlos Garcia Montoro,
Santiago Gonzalez de la Hoz,
Julius Hrivnac,
Alexander Iakovlev,
Andrei Kazymov,
Mikhail Mineev,
Fedor Prokoshin,
Grigori Rybkin,
Jose Salt,
Javier Sanchez,
Roman Sorokoletov,
Rainer Toebbicke,
Petya Vasileva,
Miguel Villaplana Perez,
Ruijun Yuan
Abstract:
The ATLAS EventIndex system comprises the catalogue of all events collected, processed or generated by the ATLAS experiment at the CERN LHC accelerator, and all associated software tools to collect, store and query this information. ATLAS records several billion particle interactions every year of operation, processes them for analysis and generates even larger simulated data samples; a global cat…
▽ More
The ATLAS EventIndex system comprises the catalogue of all events collected, processed or generated by the ATLAS experiment at the CERN LHC accelerator, and all associated software tools to collect, store and query this information. ATLAS records several billion particle interactions every year of operation, processes them for analysis and generates even larger simulated data samples; a global catalogue is needed to keep track of the location of each event record and be able to search and retrieve specific events for in-depth investigations. Each EventIndex record includes summary information on the event itself and the pointers to the files containing the full event. Most components of the EventIndex system are implemented using BigData open-source tools. This paper describes the architectural choices and their evolution in time, as well as the past, current and foreseen future implementations of all EventIndex components.
△ Less
Submitted 12 March, 2023; v1 submitted 15 November, 2022;
originally announced November 2022.
-
The Animation Transformer: Visual Correspondence via Segment Matching
Authors:
Evan Casey,
Víctor Pérez,
Zhuoru Li,
Harry Teitelman,
Nick Boyajian,
Tim Pulver,
Mike Manh,
William Grisaitis
Abstract:
Visual correspondence is a fundamental building block on the way to building assistive tools for hand-drawn animation. However, while a large body of work has focused on learning visual correspondences at the pixel-level, few approaches have emerged to learn correspondence at the level of line enclosures (segments) that naturally occur in hand-drawn animation. Exploiting this structure in animatio…
▽ More
Visual correspondence is a fundamental building block on the way to building assistive tools for hand-drawn animation. However, while a large body of work has focused on learning visual correspondences at the pixel-level, few approaches have emerged to learn correspondence at the level of line enclosures (segments) that naturally occur in hand-drawn animation. Exploiting this structure in animation has numerous benefits: it avoids the intractable memory complexity of attending to individual pixels in high resolution images and enables the use of real-world animation datasets that contain correspondence information at the level of per-segment colors. To that end, we propose the Animation Transformer (AnT) which uses a transformer-based architecture to learn the spatial and visual relationships between segments across a sequence of images. AnT enables practical ML-assisted colorization for professional animation workflows and is publicly accessible as a creative tool in Cadmium.
△ Less
Submitted 7 September, 2021; v1 submitted 6 September, 2021;
originally announced September 2021.
-
Specular reflections removal in colposcopic images based on neural networks: Supervised training with no ground truth previous knowledge
Authors:
Lauren Jimenez-Martin,
Daniel A. Valdés Pérez,
Ana M. Solares Asteasuainzarra,
Ludwig Leonard,
Marta L. Baguer Díaz-Romañach
Abstract:
Cervical cancer is a malignant tumor that seriously threatens women's health, and is one of the most common that affects women worldwide. For its early detection, colposcopic images of the cervix are used for searching for possible injuries or abnormalities. An inherent characteristic of these images is the presence of specular reflections (brightness) that make it difficult to observe some region…
▽ More
Cervical cancer is a malignant tumor that seriously threatens women's health, and is one of the most common that affects women worldwide. For its early detection, colposcopic images of the cervix are used for searching for possible injuries or abnormalities. An inherent characteristic of these images is the presence of specular reflections (brightness) that make it difficult to observe some regions, which might imply misdiagnosis. In this paper, a new strategy based on neural networks is introduced for eliminating specular reflections and estimating the unobserved anatomical cervix portion under the bright zones. For overcoming the fact that the ground truth corresponding to the specular reflection regions is always unknown, the new strategy proposes the supervised training of a neural network to learn how to restore any hidden regions of colposcopic images. Once the specular reflections are identified, they are removed from the image, and the previously trained network is used to fulfill these deleted areas. The quality of the processed images was evaluated quantitatively and qualitatively. In 21 of the 22 evaluated images, the detected specular reflections were eliminated, whereas, in the remaining one, these reflections were almost completely eliminated. The distribution of the colors and the content of the restored images are similar to those of the originals. The evaluation carried out by a specialist in Cervix Pathology concluded that, after eliminating the specular reflections, the anatomical and physiological elements of the cervix are observable in the restored images, which facilitates the medical diagnosis of cervical pathologies. Our method has the potential to improve the early detection of cervical cancer.
△ Less
Submitted 21 June, 2021; v1 submitted 3 June, 2021;
originally announced June 2021.
-
Why flatness does and does not correlate with generalization for deep neural networks
Authors:
Shuofeng Zhang,
Isaac Reid,
Guillermo Valle Pérez,
Ard Louis
Abstract:
The intuition that local flatness of the loss landscape is correlated with better generalization for deep neural networks (DNNs) has been explored for decades, spawning many different flatness measures. Recently, this link with generalization has been called into question by a demonstration that many measures of flatness are vulnerable to parameter re-scaling which arbitrarily changes their value…
▽ More
The intuition that local flatness of the loss landscape is correlated with better generalization for deep neural networks (DNNs) has been explored for decades, spawning many different flatness measures. Recently, this link with generalization has been called into question by a demonstration that many measures of flatness are vulnerable to parameter re-scaling which arbitrarily changes their value without changing neural network outputs.
Here we show that, in addition, some popular variants of SGD such as Adam and Entropy-SGD, can also break the flatness-generalization correlation. As an alternative to flatness measures, we use a function based picture and propose using the log of Bayesian prior upon initialization, $\log P(f)$, as a predictor of the generalization when a DNN converges on function $f$ after training to zero error. The prior is directly proportional to the Bayesian posterior for functions that give zero error on a test set. For the case of image classification, we show that $\log P(f)$ is a significantly more robust predictor of generalization than flatness measures are.
Whilst local flatness measures fail under parameter re-scaling, the prior/posterior, which is global quantity, remains invariant under re-scaling. Moreover, the correlation with generalization as a function of data complexity remains good for different variants of SGD.
△ Less
Submitted 21 June, 2021; v1 submitted 10 March, 2021;
originally announced March 2021.
-
CROW: Code Diversification for WebAssembly
Authors:
Javier Cabrera Arteaga,
Orestis Malivitsis,
Oscar Vera Pérez,
Benoit Baudry,
Martin Monperrus
Abstract:
The adoption of WebAssembly has rapidly increased in the last few years as it provides a fast and safe model for program execution. However, WebAssembly is not exempt from vulnerabilities that could be exploited by side channels attacks. This class of vulnerabilities that can be addressed by code diversification. In this paper, we present the first fully automated workflow for the diversification…
▽ More
The adoption of WebAssembly has rapidly increased in the last few years as it provides a fast and safe model for program execution. However, WebAssembly is not exempt from vulnerabilities that could be exploited by side channels attacks. This class of vulnerabilities that can be addressed by code diversification. In this paper, we present the first fully automated workflow for the diversification of WebAssembly binaries. We present CROW, an open-source tool implementing this workflow. We evaluate CROW's capabilities on 303 C programs and study its use on a real-life security-sensitive program: libsodium, a cryptographic library. Overall, CROWis able to generate diverse variants for 239 out of 303,(79%) small programs. Furthermore, our experiments show that our approach and tool is able to successfully diversify off-the-shelf cryptographic software (libsodium).
△ Less
Submitted 13 October, 2021; v1 submitted 17 August, 2020;
originally announced August 2020.
-
Print Defect Map** with Semantic Segmentation
Authors:
Augusto C. Valente,
Cristina Wada,
Deangela Neves,
Deangeli Neves,
Fábio V. M. Perez,
Guilherme A. S. Megeto,
Marcos H. Cascone,
Otavio Gomes,
Qian Lin
Abstract:
Efficient automated print defect map** is valuable to the printing industry since such defects directly influence customer-perceived printer quality and manually map** them is cost-ineffective. Conventional methods consist of complicated and hand-crafted feature engineering techniques, usually targeting only one type of defect. In this paper, we propose the first end-to-end framework to map pr…
▽ More
Efficient automated print defect map** is valuable to the printing industry since such defects directly influence customer-perceived printer quality and manually map** them is cost-ineffective. Conventional methods consist of complicated and hand-crafted feature engineering techniques, usually targeting only one type of defect. In this paper, we propose the first end-to-end framework to map print defects at pixel level, adopting an approach based on semantic segmentation. Our framework uses Convolutional Neural Networks, specifically DeepLab-v3+, and achieves promising results in the identification of defects in printed images. We use synthetic training data by simulating two types of print defects and a print-scan effect with image processing and computer graphic techniques. Compared with conventional methods, our framework is versatile, allowing two inference strategies, one being near real-time and providing coarser results, and the other focusing on offline processing with more fine-grained detection. Our model is evaluated on a dataset of real printed images.
△ Less
Submitted 27 January, 2020;
originally announced January 2020.
-
An Automated System for Checking Lithography Friendliness of Standard Cells
Authors:
I-Lun Tseng,
Yongfu Li,
Valerio Perez,
Vikas Tripathi,
Zhao Chuan Lee,
Jonathan Yoong Seang Ong
Abstract:
At advanced process nodes, lithography weakpoints can exist in physical layouts of integrated circuit designs even if the layouts pass design rule checking (DRC). Existence of lithography weakpoints in a physical layout can cause manufacturability issues, which in turn can result in yield losses. In our experiments, we have found that specific standard cells have tendencies to create lithography w…
▽ More
At advanced process nodes, lithography weakpoints can exist in physical layouts of integrated circuit designs even if the layouts pass design rule checking (DRC). Existence of lithography weakpoints in a physical layout can cause manufacturability issues, which in turn can result in yield losses. In our experiments, we have found that specific standard cells have tendencies to create lithography weakpoints after their cell instances are placed and routed, even though each of these cells does not contain any lithography weakpoint before performing placement and routing. In addition, our experiments have shown that abutted standard cell instances can induce lithography weakpoints. Therefore, in this paper, we propose methodologies that are used in a novel software system for checking standard cells in terms of the aforementioned lithography issues. Specifically, the software system is capable of detecting and sorting problematic standard cells which are prone to generate lithography weakpoints, as well as reporting standard cells that should not be abutted. Methodologies proposed in this paper allow us to reduce or even prevent the generation of undesirable lithography weakpoints during the physical synthesis phase of designing a digital integrated circuit.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
Context-Aware DFM Rule Analysis and Scoring Using Machine Learning
Authors:
Vikas Tripathi,
Valerio Perez,
Yongfu Li,
Zhao Chuan Lee,
I-Lun Tseng,
Jonathan Ong
Abstract:
To evaluate the quality of physical layout designs in terms of manufacturability, DFM rule scoring techniques have been widely used in physical design and physical verification phases. However, one major drawback of conventional DFM rule scoring methodologies is that resultant DFM rule scores may not accurate since the scores may not highly correspond to lithography simulation results. For instanc…
▽ More
To evaluate the quality of physical layout designs in terms of manufacturability, DFM rule scoring techniques have been widely used in physical design and physical verification phases. However, one major drawback of conventional DFM rule scoring methodologies is that resultant DFM rule scores may not accurate since the scores may not highly correspond to lithography simulation results. For instance, conventional DFM rule scoring methodologies usually use rule-based techniques to compute scores without considering neighboring geometric scenarios of targeted layout shapes. That can lead to inaccurate scoring results since computed DFM rule scores can be either too optimistic or too pessimistic. Therefore, in this paper, we propose a novel approach with the use of machine learning technology to analyze the context of targeted layouts and predict their lithography impacts on manufacturability.
△ Less
Submitted 16 August, 2018;
originally announced August 2018.
-
Creation and Fixing of Lithography Hotspots with Synopsys Tools
Authors:
I-Lun Tseng,
Valerio Perez,
Yongfu Li,
Zhao Chuan Lee,
Vikas Tripathi,
Jonathan Yoong Seang Ong
Abstract:
At advanced process nodes, pattern matching techniques have been used in the detection of lithography hotspots, which can affect yields of manufactured integrated circuits. Although commercial pattern matching and in-design hotspot fixing tools have been developed, engineers still need to verify that specific hotspot patterns in routed designs can indeed be detected or even repaired by software to…
▽ More
At advanced process nodes, pattern matching techniques have been used in the detection of lithography hotspots, which can affect yields of manufactured integrated circuits. Although commercial pattern matching and in-design hotspot fixing tools have been developed, engineers still need to verify that specific hotspot patterns in routed designs can indeed be detected or even repaired by software tools. Therefore, there is the need to create test cases with which targeted hotspot patterns can be generated in routed layouts by using an APR (automatic placement and routing) tool. In this paper, we propose a methodology of creating hotspot patterns in the routing space by using Synopsys tools. Also, methods for repairing hotspots during the physical design phase are presented. With the use of the proposed hotspot creation methodology, we can generate routed designs containing targeted hotspot patterns. As a result, the effectiveness of hotspot detection rules, hotspot fixing guidance rules, and relevant software tool functions can be verified.
△ Less
Submitted 16 August, 2018;
originally announced August 2018.
-
Advanced In-Design Auto-Fixing Flow for Cell Abutment Pattern Matching Weakpoints
Authors:
Yongfu Li,
Valerio Perez,
I-Lun Tseng,
Zhao Chuan Lee,
Vikas Tripathi,
Jason Khaw,
Yoong Seang Jonathan Ong
Abstract:
Pattern matching design verification has gained noticeable attention in semiconductor technologies as it can precisely identify more localized problematic areas (weakpoints) in the layout. To address these weakpoints, engineers adopt 'Rip-up and Reroute' methodology to reroute the nets and avoid these weakpoints. However, the technique is unable to address weakpoints due to the cell placement. The…
▽ More
Pattern matching design verification has gained noticeable attention in semiconductor technologies as it can precisely identify more localized problematic areas (weakpoints) in the layout. To address these weakpoints, engineers adopt 'Rip-up and Reroute' methodology to reroute the nets and avoid these weakpoints. However, the technique is unable to address weakpoints due to the cell placement. The only present approach is to manually shift or flip the standard cells to eradicate the weakpoint. To overcome the challenge in going from a manual and laborious process to a fully automated fixing, we have proposed an in-design auto-fixing feature, tested with the commercial design tool, Synopsys IC Compiler. Our experimental result has demonstrated close to one hundred percent lithography weakpoints fixing on all of our 14nm designs.
△ Less
Submitted 25 May, 2018;
originally announced May 2018.
-
A New Approach to Coding in Content Based MANETs
Authors:
Joshua Joy,
Yu-Ting Yu,
Victor Perez,
Dennis Lu,
Mario Gerla
Abstract:
In content-based mobile ad hoc networks (CB-MANETs), random linear network coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes. This however is vulnerable to pollution attacks. To avoid attacks, a brute force approach is to restrict the mixing at the source. However, source restricted…
▽ More
In content-based mobile ad hoc networks (CB-MANETs), random linear network coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes. This however is vulnerable to pollution attacks. To avoid attacks, a brute force approach is to restrict the mixing at the source. However, source restricted NC generally reduces the robustness of the code in the face of errors, losses and mobility induced intermittence. CB-MANETs introduce a new option. Caching is common in CB MANETs and a fully reassembled cached file can be viewed as a new source. Thus, NC packets can be mixed at all sources (including the originator and the intermediate caches) yet still providing protection from pollution. The hypothesis we wish to test in this paper is whether in CB-MANETs with sufficient caches of a file, the performance (in terms of robustness) of the restricted coding equals that of unrestricted coding.
In this paper, we examine and compare unrestricted coding to full cache coding, source only coding, and no coding. As expected, we find that full cache coding remains competitive with unrestricted coding while maintaining full protection against pollution attacks.
△ Less
Submitted 5 June, 2015;
originally announced June 2015.