Skip to main content

Showing 1–25 of 25 results for author: Romano, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13030  [pdf, other

    physics.comp-ph cs.CG

    Point containment algorithms for constructive solid geometry with unbounded primitives

    Authors: Paul K. Romano, Patrick A. Myers, Seth R. Johnson, Aljaž Kolšek, Patrick C. Shriwise

    Abstract: We present several algorithms for evaluating point containment in constructive solid geometry (CSG) trees with unbounded primitives. Three algorithms are presented based on postfix, prefix, and infix notations of the CSG binary expression tree. We show that prefix and infix notations enable short-circuiting logic, which reduces the number of primitives that must be checked during point containment… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2405.03484  [pdf, other

    cs.SD cs.LG eess.AS

    Whispy: Adapting STT Whisper Models to Real-Time Environments

    Authors: Antonio Bevilacqua, Paolo Saviano, Alessandro Amirante, Simon Pietro Romano

    Abstract: Large general-purpose transformer models have recently become the mainstay in the realm of speech analysis. In particular, Whisper achieves state-of-the-art results in relevant tasks such as speech recognition, translation, language identification, and voice activity detection. However, Whisper models are not designed to be used in real-time conditions, and this limitation makes them unsuitable fo… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  3. arXiv:2405.01205  [pdf, other

    cs.LG cs.CV

    Error-Driven Uncertainty Aware Training

    Authors: Pedro Mendes, Paolo Romano, David Garlan

    Abstract: Neural networks are often overconfident about their predictions, which undermines their reliability and trustworthiness. In this work, we present a novel technique, named Error-Driven Uncertainty Aware Training (EUAT), which aims to enhance the ability of neural models to estimate their uncertainty correctly, namely to be highly uncertain when they output inaccurate predictions and low uncertain w… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  4. arXiv:2403.12345  [pdf, other

    cs.DC

    Performance Portable Monte Carlo Particle Transport on Intel, NVIDIA, and AMD GPUs

    Authors: John Tramm, Paul Romano, Patrick Shriwise, Amanda Lund, Johannes Doerfert, Patrick Steinbrecher, Andrew Siegel, Gavin Ridley

    Abstract: OpenMC is an open source Monte Carlo neutral particle transport application that has recently been ported to GPU using the OpenMP target offloading model. We examine the performance of OpenMC at scale on the Frontier, Polaris, and Aurora supercomputers, demonstrating that performance portability has been achieved by OpenMC across all three major GPU vendors (AMD, NVIDIA, and Intel). OpenMC's GPU p… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  5. PIM-STM: Software Transactional Memory for Processing-In-Memory Systems

    Authors: André Lopes, Daniel Castro, Paolo Romano

    Abstract: Processing-In-Memory (PIM) is a novel approach that augments existing DRAM memory chips with lightweight logic. By allowing to offload computations to the PIM system, this architecture allows for circumventing the data-bottleneck problem that affects many modern workloads. This work tackles the problem of how to build efficient software implementations of the Transactional Memory (TM) abstraction… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

    Comments: To be published in 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2 (ASPLOS '24), April 27-May 1, 2024, La Jolla, CA, USA

    ACM Class: B.3.3; B.8.2; C.4; D.1.3

  6. arXiv:2307.15677  [pdf, other

    cs.LG cs.CR

    Adversarial training for tabular data with attack propagation

    Authors: Tiago Leon Melo, João Bravo, Marco O. P. Sampaio, Paolo Romano, Hugo Ferreira, João Tiago Ascensão, Pedro Bizarro

    Abstract: Adversarial attacks are a major concern in security-centered applications, where malicious actors continuously try to mislead Machine Learning (ML) models into wrongly classifying fraudulent activity as legitimate, whereas system maintainers try to stop them. Adversarially training ML models that are robust against such attacks can prevent business losses and reduce the work load of system maintai… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  7. arXiv:2304.02497  [pdf, other

    cs.LG

    Hyper-parameter Tuning for Adversarially Robust Models

    Authors: Pedro Mendes, Paolo Romano, David Garlan

    Abstract: This work focuses on the problem of hyper-parameter tuning (HPT) for robust (i.e., adversarially trained) models, shedding light on the new challenges and opportunities arising during the HPT process for robust models. To this end, we conduct an extensive experimental study based on 3 popular deep models, in which we explore exhaustively 9 (discretized) HPs, 2 fidelity dimensions, and 2 attack bou… ▽ More

    Submitted 13 June, 2024; v1 submitted 5 April, 2023; originally announced April 2023.

  8. Workflows Community Summit 2022: A Roadmap Revolution

    Authors: Rafael Ferreira da Silva, Rosa M. Badia, Venkat Bala, Debbie Bard, Peer-Timo Bremer, Ian Buckley, Silvina Caino-Lores, Kyle Chard, Carole Goble, Shantenu Jha, Daniel S. Katz, Daniel Laney, Manish Parashar, Frederic Suter, Nick Tyler, Thomas Uram, Ilkay Altintas, Stefan Andersson, William Arndt, Juan Aznar, Jonathan Bader, Bartosz Balis, Chris Blanton, Kelly Rosa Braghetto, Aharon Brodutch , et al. (80 additional authors not shown)

    Abstract: Scientific workflows have become integral tools in broad scientific computing use cases. Science discovery is increasingly dependent on workflows to orchestrate large and complex scientific experiments that range from execution of a cloud-based data preprocessing pipeline to multi-facility instrument-to-edge-to-HPC computational workflows. Given the changing landscape of scientific computing and t… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Report number: ORNL/TM-2023/2885

  9. GOSPF: An energy efficient implementation of the OSPF routing protocol

    Authors: Maurizio D'Arienzo, Simon Pietro Romano

    Abstract: Energy saving is currently one of the most challenging issues for the Internet research community. Indeed, the exponential growth of applications and services induces a remarkable increase in power consumption and hence calls for novel solutions which are capable to preserve energy of the infrastructures, at the same time maintaining the required Quality of Service guarantees. In this paper we int… ▽ More

    Submitted 30 June, 2022; originally announced July 2022.

    Comments: 18 pages

    Journal ref: Journal of Network and Computer Applications, Volume 75, 2016, Pages 110-127, ISSN 1084-8045

  10. UMPIRE: A Universal Moderator for the Participation in IETF Remote Events

    Authors: Simon Pietro Romano

    Abstract: UMPIRE provides seamless meeting interaction among remote and local participants. It uses the BFCP, an IETF standard for moderation.BFCP introduces automated floor control functions to a centralized conferencing environment. This article discusses the design and implementation of the UMPIRE system and highlights the most notable solutions we devised to handle variegated requirements and constraint… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

    Comments: 8 pages, six figures

    Journal ref: IEEE Communications Magazine, vol. 53, no. 4, pp. 234-239, April 2015

  11. arXiv:2205.09493  [pdf, other

    cs.CR

    Dockerized Android: a container-based platform to build mobile Android scenarios for Cyber Ranges

    Authors: Daniele Capone, Francesco Caturano, Angelo Delicato, Gaetano Perrone, Simon Pietro Romano

    Abstract: The best way to train people about security is through Cyber Ranges, i.e., the virtual platform used by cyber-security experts to learn new skills and attack vectors. In order to realize such virtual scenarios, container-based virtualization is commonly adopted, as it provides several benefits in terms of performance, resource usage, and portability. Unfortunately, the current generation of Cyber… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

    Comments: 9 pages, 4 figures

  12. arXiv:2205.09230  [pdf, other

    cs.CR

    ExploitWP2Docker: a Platform for Automating the Generation of Vulnerable WordPress Environments for Cyber Ranges

    Authors: Francesco Caturano, Nicola d'Ambrosio, Gaetano Perrone, Luigi Previdente, Simon Pietro Romano

    Abstract: A cyber range is a realistic simulation of an organization's network infrastructure, commonly used for cyber security training purposes. It provides a safe environment to assess competencies in both offensive and defensive techniques. An important step during the realization of a cyber range is the generation of vulnerable machines. This step is challenging and requires a laborious manual configur… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

    Comments: 7 pages, 3 figures

  13. arXiv:2111.02257  [pdf, other

    cs.CR cs.DC

    Chirotonia: A Scalable and Secure e-Voting Framework based on Blockchains and Linkable Ring Signatures

    Authors: Antonio Russo, Antonio Fernández Anta, Maria Isabel González Vasco, Simon Pietro Romano

    Abstract: In this paper we propose a comprehensive and scalable framework to build secure-by-design e-voting systems. Decentralization, transparency, determinism, and untamperability of votes are granted by dedicated smart contracts on a blockchain, while voter authenticity and anonymity are achieved through (provable secure) linkable ring signatures. These, in combination with suitable smart contract const… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  14. arXiv:2108.02479  [pdf, other

    cs.LG

    HyperJump: Accelerating HyperBand via Risk Modelling

    Authors: Pedro Mendes, Maria Casimiro, Paolo Romano, David Garlan

    Abstract: In the literature on hyper-parameter tuning, a number of recent solutions rely on low-fidelity observations (e.g., training with sub-sampled datasets) in order to efficiently identify promising configurations to be then tested via high-fidelity observations (e.g., using the full dataset). Among these, HyperBand is arguably one of the most popular solutions, due to its efficiency and theoretically… ▽ More

    Submitted 2 December, 2022; v1 submitted 5 August, 2021; originally announced August 2021.

  15. Leveraging AI to optimize website structure discovery during Penetration Testing

    Authors: Diego Antonelli, Roberta Cascella, Gaetano Perrone, Simon Pietro Romano, Antonio Schiano

    Abstract: Dirbusting is a technique used to brute force directories and file names on web servers while monitoring HTTP responses, in order to enumerate server contents. Such a technique uses lists of common words to discover the hidden structure of the target website. Dirbusting typically relies on response codes as discovery conditions to find new pages. It is widely used in web application penetration te… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: J Comput Virol Hack Tech (2024)

  16. arXiv:2011.04726  [pdf, other

    cs.LG cs.DC

    TrimTuner: Efficient Optimization of Machine Learning Jobs in the Cloud via Sub-Sampling

    Authors: Pedro Mendes, Maria Casimiro, Paolo Romano, David Garlan

    Abstract: This work introduces TrimTuner, the first system for optimizing machine learning jobs in the cloud to exploit sub-sampling techniques to reduce the cost of the optimization process while kee** into account user-specified constraints. TrimTuner jointly optimizes the cloud and application-specific parameters and, unlike state of the art works for cloud optimization, eschews the need to train the m… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

    Comments: Mascots 2020

  17. LIoTS: League of IoT Sovereignties. A Scalable approach for a Transparent Privacy-safe Federation of Secured IoT Platforms

    Authors: Flavio Cirillo, Nicola Capuano, Simon Pietro Romano, Ernö Kovacs

    Abstract: Internet-of-Things has entered all the fields where data are produced and processed, resulting in a plethora of IoT platforms, typically cloud-based, centralizing data and services management. This has brought to many disjoint IoT silos. Significant efforts have been devoted to integration, recurrently resulting into bigger centralized infrastructures. Such an approach often stumbles upon the relu… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: 4 pages, 5 figures, 1 table. Presented at the IEEE Local Networks Conference (LCN)

    ACM Class: C.2.4

    Journal ref: 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 2019, pp. 226-229

  18. Stretching the capacity of Hardware Transactional Memory in IBM POWER architectures

    Authors: Ricardo Filipe, Shady Issa, Paolo Romano, João Barreto

    Abstract: The hardware transactional memory (HTM) implementations in commercially available processors are significantly hindered by their tight capacity constraints. In practice, this renders current HTMs unsuitable to many real-world workloads of in-memory databases. This paper proposes SI-HTM, which stretches the capacity bounds of the underlying HTM, thus opening HTM to a much broader class of applicati… ▽ More

    Submitted 6 March, 2020; originally announced March 2020.

    Journal ref: PPoPP '19: Proceedings of the 24th Symposium on Principles and Practice of Parallel Programming, February 2019, Pages 107-119

  19. Bandwidth-Aware Page Placement in NUMA

    Authors: David Gureya, João Neto, Reza Karimi, João Barreto, Pramod Bhatotia, Vivien Quema, Rodrigo Rodrigues, Paolo Romano, Vladimir Vlassov

    Abstract: Page placement is a critical problem for memoryintensive applications running on a shared-memory multiprocessor with a non-uniform memory access (NUMA) architecture. State-of-the-art page placement mechanisms interleave pages evenly across NUMA nodes. However, this approach fails to maximize memory throughput in modern NUMA systems, characterised by asymmetric bandwidths and latencies, and sensiti… ▽ More

    Submitted 19 May, 2023; v1 submitted 6 March, 2020; originally announced March 2020.

    Journal ref: 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, 2020 pp. 546-556

  20. arXiv:1907.07643  [pdf, other

    cs.NI eess.SY

    Cooperative Intersection Crossing over 5G

    Authors: Luca Maria Castiglione, Paolo Falcone, Alberto Petrillo, Simon Pietro Romano, Stefania Santini

    Abstract: Autonomous driving is a safety critical application of sensing and decision-making technologies. Communication technologies extend the awareness capabilities of vehicles, beyond what is achievable with the on-board systems only. Nonetheless, issues typically related to wireless networking must be taken into account when designing safe and reliable autonomous systems. The aim of this work is to pre… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

    Comments: 15 pages, 16 figures, submitted to journal

  21. arXiv:1905.02119  [pdf, ps, other

    cs.DC

    Lynceus: Cost-efficient Tuning and Provisioning of Data Analytic Jobs

    Authors: Maria Casimiro, Diego Didona, Paolo Romano, Luís Rodrigues, Willy Zwanepoel, David Garlan

    Abstract: Modern data analytic and machine learning jobs find in the cloud a natural deployment platform to satisfy their notoriously large resource requirements. Yet, to achieve cost efficiency, it is crucial to identify a deployment configuration that satisfies user-defined QoS constraints (e.g., on execution time), while avoiding unnecessary over-provisioning. This paper introduces Lynceus, a new approac… ▽ More

    Submitted 20 January, 2020; v1 submitted 6 May, 2019; originally announced May 2019.

    Comments: This updated version features a novel extension of our approach: the time out mechanism. Additionally, we improved the write-up of the paper, fruit of the collaboration with professor David Garlan and Carnegie Mellon Univeristy

  22. HeTM: Transactional Memory for Heterogeneous Systems

    Authors: Daniel Castro, Paolo Romano, Aleksandar Ilic, Amin M. Khan

    Abstract: Modern heterogeneous computing architectures, which couple multi-core CPUs with discrete many-core GPUs (or other specialized hardware accelerators), enable unprecedented peak performance and energy efficiency levels. Unfortunately, though, develo** applications that can take full advantage of the potential of heterogeneous systems is a notoriously hard task. This work takes a step towards reduc… ▽ More

    Submitted 2 September, 2019; v1 submitted 2 May, 2019; originally announced May 2019.

    Comments: The current work was accepted in the 28th International Conference on Parallel Architectures and Compilation Techniques (PACT'19)

  23. arXiv:1411.7910  [pdf, other

    cs.PF cs.DC

    A Flexible Framework for Accurate Simulation of Cloud In-Memory Data Stores

    Authors: Pierangelo Di Sanzo, Francesco Quaglia, Bruno Ciciani, Alessandro Pellegrini, Diego Didona, Paolo Romano, Roberto Palmieri, Sebastiano Peluso

    Abstract: In-memory (transactional) data stores are recognized as a first-class data management technology for cloud platforms, thanks to their ability to match the elasticity requirements imposed by the pay-as-you-go cost model. On the other hand, defining the well-suited amount of cache servers to be deployed, and the degree of in-memory replication of slices of data, in order to optimize reliability/avai… ▽ More

    Submitted 28 November, 2014; originally announced November 2014.

    Comments: 34 pages

  24. arXiv:1410.5102  [pdf, other

    cs.PF cs.LG

    On Bootstrap** Machine Learning Performance Predictors via Analytical Models

    Authors: Diego Didona, Paolo Romano

    Abstract: Performance modeling typically relies on two antithetic methodologies: white box models, which exploit knowledge on system's internals and capture its dynamics using analytical approaches, and black box techniques, which infer relations among the input and output variables of a system based on the evidences gathered during an initial training phase. In this paper we investigate a technique, which… ▽ More

    Submitted 19 October, 2014; originally announced October 2014.

    Comments: 11 pages

  25. arXiv:1308.2147  [pdf, other

    cs.DB cs.DC

    Exploiting Locality in Lease-Based Replicated Transactional Memory via Task Migration

    Authors: Danny Hendler, Alex Naiman, Sebastiano Peluso, Francesco Quaglia, Paolo Romano, Adi Suissa

    Abstract: We present Lilac-TM, the first locality-aware Distributed Software Transactional Memory (DSTM) implementation. Lilac-TM is a fully decentralized lease-based replicated DSTM. It employs a novel self- optimizing lease circulation scheme based on the idea of dynamically determining whether to migrate transactions to the nodes that own the leases required for their validation, or to demand the acquisi… ▽ More

    Submitted 9 August, 2013; originally announced August 2013.

    Comments: 23 pages, 5 figures