Skip to main content

Showing 1–18 of 18 results for author: Beckett, R

.
  1. arXiv:2410.15086  [pdf, other

    cs.AI cs.CL cs.DC cs.NI cs.PF

    Towards Safer Heuristics With XPlain

    Authors: Pantea Karimi, Solal Pirelli, Siva Kesava Reddy Kakarla, Ryan Beckett, Santiago Segarra, Beibin Li, Pooria Namyar, Behnaz Arzani

    Abstract: Many problems that cloud operators solve are computationally expensive, and operators often use heuristic algorithms (that are faster and scale better than optimal) to solve them more efficiently. Heuristic analyzers enable operators to find when and by how much their heuristics underperform. However, these tools do not provide enough detail for operators to mitigate the heuristic's impact in prac… ▽ More

    Submitted 19 October, 2024; originally announced October 2024.

  2. arXiv:2407.10623  [pdf

    cond-mat.mtrl-sci cond-mat.soft physics.app-ph

    Roadmap for Animate Matter

    Authors: Giorgio Volpe, Nuno A. M. Araújo, Maria Guix, Mark Miodownik, Nicolas Martin, Laura Alvarez, Juliane Simmchen, Roberto Di Leonardo, Nicola Pellicciotta, Quentin Martinet, Jérémie Palacci, Wai Kit Ng, Dhruv Saxena, Riccardo Sapienza, Sara Nadine, João F. Mano, Reza Mahdavi, Caroline Beck Adiels, Joe Forth, Christian Santangelo, Stefano Palagi, Ji Min Seok, Victoria A. Webster-Wood, Shuhong Wang, Lining Yao , et al. (15 additional authors not shown)

    Abstract: Humanity has long sought inspiration from nature to innovate materials and devices. As science advances, nature-inspired materials are becoming part of our lives. Animate materials, characterized by their activity, adaptability, and autonomy, emulate properties of living systems. While only biological materials fully embody these principles, artificial versions are advancing rapidly, promising tra… ▽ More

    Submitted 10 September, 2024; v1 submitted 15 July, 2024; originally announced July 2024.

  3. arXiv:2312.06875  [pdf, other

    cs.NI

    Oracle-based Protocol Testing with Eywa

    Authors: Siva Kesava Reddy Kakarla, Ryan Beckett

    Abstract: We present oracle-based testing a new technique for automatic black-box testing of network protocol implementations. Oracle-based testing leverages recent advances in LLMs to build rich models of intended protocol behavior from knowledge embedded in RFCs, blogs, forums, and other natural language sources. From these models it systematically derives exhaustive test cases using symbolic program exec… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  4. arXiv:2311.12779  [pdf, other

    cs.NI cs.GT

    Finding Adversarial Inputs for Heuristics using Multi-level Optimization

    Authors: Pooria Namyar, Behnaz Arzani, Ryan Beckett, Santiago Segarra, Himanshu Raj, Umesh Krishnaswamy, Ramesh Govindan, Srikanth Kandula

    Abstract: Production systems use heuristics because they are faster or scale better than their optimal counterparts. Yet, practitioners are often unaware of the performance gap between a heuristic and the optimum or between two heuristics in realistic scenarios. We present MetaOpt, a system that helps analyze heuristics. Users specify the heuristic and the optimal (or another heuristic) as input, and MetaOp… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

  5. arXiv:2311.02800  [pdf, other

    cs.DC

    Kivi: Verification for Cluster Management

    Authors: Bingzhe Liu, Gangmuk Lim, Ryan Beckett, P. Brighten Godfrey

    Abstract: Modern cloud infrastructure is powered by cluster management systems such as Kubernetes and Docker Swarm. While these systems seek to minimize users' operational burden, the complex, dynamic, and non-deterministic nature of these systems makes them hard to reason about, potentially leading to failures ranging from performance degradation to outages. We present Kivi, the first system for verifying… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 18 pages

  6. arXiv:2307.04945  [pdf, other

    cs.NI cs.PL

    What do LLMs need to Synthesize Correct Router Configurations?

    Authors: Rajdeep Mondal, Alan Tang, Ryan Beckett, Todd Millstein, George Varghese

    Abstract: We investigate whether Large Language Models (e.g., GPT-4) can synthesize correct router configurations with reduced manual effort. We find GPT-4 works very badly by itself, producing promising draft configurations but with egregious errors in topology, syntax, and semantics. Our strategy, that we call Verified Prompt Programming, is to combine GPT-4 with verifiers, and use localized feedback from… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  7. arXiv:2307.00652  [pdf

    astro-ph.EP cond-mat.mtrl-sci physics.geo-ph

    Thermochemical Stability of Low-Iron, Manganese-Enriched Olivine in Astrophysical Environments

    Authors: Denton S. Ebel, Michael K. Weisberg, John R. Beckett

    Abstract: Low-iron, manganese-enriched (LIME) olivine grains are found in cometary samples returned by the Stardust mission to comet 81P/Wild 2. Similar grains are found in primitive meteoritic clasts and unequilibrated meteorite matrix. LIME olivine is thermodynamically stable in a vapor of solar composition at high temperature at total pressures of a millibar to a microbar, but enrichment of solar composi… ▽ More

    Submitted 2 July, 2023; originally announced July 2023.

    Comments: 15 pages, 5 figures

    Journal ref: Meteoritics and Planetary Sciences 47, 585-593 (2012)

  8. arXiv:2209.12870  [pdf, other

    cs.NI

    Test Coverage for Network Configurations

    Authors: Xieyang Xu, Weixin Deng, Ryan Beckett, Ratul Mahajan, David Walker

    Abstract: We develop NetCov, the first tool to reveal which network configuration lines are being tested by a suite of network tests. It helps network engineers improve test suites and thus increase network reliability. A key challenge in its development is that many network tests test the data plane instead of testing the configurations (control plane) directly. We must be able to efficiently infer which c… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  9. arXiv:2207.13147  [pdf, other

    cs.NI

    FP4: Line-rate Greybox Fuzz Testing for P4 Switches

    Authors: Nofel Yaseen, Liangcheng Yu, Caleb Stanford, Ryan Beckett, Vincent Liu

    Abstract: Compared to fixed-function switches, the flexibility of programmable switches comes at a cost, as programmer mistakes frequently result in subtle bugs in the network data plane. In this paper, we present the design and implementation of FP4, a fuzz-testing framework for P4 switches that achieves high expressiveness, coverage, and scalability. FP4 directly tests running switches by generating sem… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

  10. arXiv:2206.02100  [pdf, other

    cs.NI

    ACORN: Network Control Plane Abstraction using Route Nondeterminism

    Authors: Divya Raghunathan, Ryan Beckett, Aarti Gupta, David Walker

    Abstract: Networks are hard to configure correctly, and misconfigurations occur frequently, leading to outages or security breaches. Formal verification techniques have been applied to guarantee the correctness of network configurations, thereby improving network reliability. This work addresses verification of distributed network control planes, with two distinct contributions to improve the scalability of… ▽ More

    Submitted 5 June, 2022; originally announced June 2022.

    Comments: 23 pages, 10 figures

  11. arXiv:2204.10303  [pdf, other

    cs.LO cs.NI

    Modular Control Plane Verification via Temporal Invariants

    Authors: Timothy Alberdingk Thijm, Ryan Beckett, Aarti Gupta, David Walker

    Abstract: Monolithic control plane verification cannot scale to hyperscale network architectures with tens of thousands of nodes, heterogeneous network policies and thousands of network changes a day. Instead, modular verification offers improved scalability, reasoning over diverse behaviors, and robustness following policy updates. We introduce Timepiece, a new modular control plane verification system. Wh… ▽ More

    Submitted 8 April, 2023; v1 submitted 21 April, 2022; originally announced April 2022.

    Comments: 27 pages (22 pages body, ~3 pages references, ~1 page proofs), 14 figures, accepted to PLDI 2023

    ACM Class: C.2.2; D.2.4; F.3.1

  12. LIGHTYEAR: Using Modularity to Scale BGP Control Plane Verification

    Authors: Alan Tang, Ryan Beckett, Steven Benaloh, Karthick Jayaraman, Tejas Patil, Todd Millstein, George Varghese

    Abstract: Current network control plane verification tools cannot scale to large networks, because of the complexity of jointly reasoning about the behaviors of all nodes in the network. In this paper we present a modular approach to control plane verification, whereby end-to-end network properties are verified via a set of purely local checks on individual nodes and edges. The approach targets the verifica… ▽ More

    Submitted 20 September, 2023; v1 submitted 20 April, 2022; originally announced April 2022.

    Comments: 12 pages (+ 2 pages references), 3 figures, Accepted at SIGCOMM '23

    Journal ref: In Proceedings of the ACM SIGCOMM 2023 Conference (ACM SIGCOMM '23). Association for Computing Machinery, New York, NY, USA, 94-107

  13. Kirigami, the Verifiable Art of Network Cutting

    Authors: Tim Alberdingk Thijm, Ryan Beckett, Aarti Gupta, David Walker

    Abstract: We introduce a modular verification approach to network control plane verification, where we cut a network into smaller fragments to improve the scalability of SMT solving. Users provide an annotated cut which describes how to generate these fragments from the monolithic network, and we verify each fragment independently, using the annotations to define assumptions and guarantees over fragments ak… ▽ More

    Submitted 12 February, 2022; originally announced February 2022.

    Comments: 30 pages, 9 figures, submitted to CAV 2022

    ACM Class: C.2.2; D.2.4; F.3.1

  14. arXiv:1906.00026  [pdf, other

    cs.HC

    IoT Skullfort: Exploring the Impact of Internet Connected Cosplay

    Authors: Rhys Beckett, Charith Perera

    Abstract: In this paper, we explore the potential impact of Internet of Things (IoT) technology may have on the cosplay community. We developed a costume (an IoT Skullfort) and embedded IoT technology to enhance its capabilities and user interactions. Sensing technologies are widely used in many different wearable domains including cosplay scenarios. However, in most of these scenarios, typical interaction… ▽ More

    Submitted 8 July, 2019; v1 submitted 28 May, 2019; originally announced June 2019.

    Journal ref: Proceedings of the 2019 ACM International Joint Conference and 2019 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers

  15. arXiv:1902.00849  [pdf, other

    cs.NI

    Contra: A Programmable System for Performance-aware Routing

    Authors: Kuo-Feng Hsu, Ryan Beckett, Ang Chen, Jennifer Rexford, Praveen Tammana, David Walker

    Abstract: We present Contra, a system for performance-aware routing that can adapt to traffic changes at hardware speeds. While existing work has developed point solutions for performance-aware routing on a fixed topology (e.g., a Fattree) with a fixed routing policy (e.g., use least utilized paths), Contra can be configured to operate seamlessly over any network topology and a wide variety of sophisticated… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

  16. arXiv:1806.08744  [pdf, other

    cs.NI

    Control Plane Compression

    Authors: Ryan Beckett, Aarti Gupta, Ratul Mahajan, David Walker

    Abstract: We develop an algorithm capable of compressing large networks into a smaller ones with similar control plane behavior: For every stable routing solution in the large, original network, there exists a corresponding solution in the compressed network, and vice versa. Our compression algorithm preserves a wide variety of network properties including reachability, loop freedom, and path length. Conseq… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: Extended version of the paper appearing in ACM SIGCOMM 2018

  17. Kleene Algebra Modulo Theories

    Authors: Michael Greenberg, Ryan Beckett, Eric Campbell

    Abstract: Kleene algebras with tests (KATs) offer sound, complete, and decidable equational reasoning about regularly structured programs. Interest in KATs has increased greatly since NetKAT demonstrated how well extensions of KATs with domain-specific primitives and extra axioms apply to computer networks. Unfortunately, extending a KAT to a new domain by adding custom primitives, proving its equational th… ▽ More

    Submitted 4 April, 2022; v1 submitted 10 July, 2017; originally announced July 2017.

    Comments: PLDI 2022

  18. Dependence of the superconducting transition temperature of single- and polycrystalline MgB2 on hydrostatic pressure

    Authors: S. Deemyad, T. Tomita, J. J. Hamlin, B. R. Beckett, J. S. Schilling, D. G. Hinks, J. D. Jorgensen, S. Lee, S. Tajima

    Abstract: The dependence of Tc for MgB2 on purely hydrostatic or nearly hydrostatic pressure has been determined to 23 GPa for single-crystalline and to 32 GPa for polycrystalline samples, and found to be in good agreement. Tc decreases from 39 K at ambient pressure to 15 K at 32 GPa with an initial slope dTc/dP = -1.11(2) K/GPa. Evidence is presented that the differing values of dTc/dP reported in the li… ▽ More

    Submitted 11 September, 2002; originally announced September 2002.

    Comments: Invited paper for a special edition of Physica on MgB2

    Journal ref: Physica C 385, 105 (2003)