-
Dilute Paramagnetism and Non-Trivial Topology in Quasicrystal Approximant Fe$_4$Al$_{13}$
Authors:
Keenan E. Avers,
Jarryd A. Horn,
Ram Kumar,
Shanta R. Saha,
Yuanfeng Xu,
B. Andrei Bernevig,
Peter Zavalij,
Johnpierre Paglione
Abstract:
A very fundamental property of both weakly and strongly interacting materials is the nature of its magnetic response. In this work we detail the growth of crystals of the quasicrystal approximant Fe$_4$Al$_{13}$ with an Al flux solvent method. We characterize our samples using electrical transport and heat capacity, yielding results consistent with a simple non-magnetic metal. However, magnetizati…
▽ More
A very fundamental property of both weakly and strongly interacting materials is the nature of its magnetic response. In this work we detail the growth of crystals of the quasicrystal approximant Fe$_4$Al$_{13}$ with an Al flux solvent method. We characterize our samples using electrical transport and heat capacity, yielding results consistent with a simple non-magnetic metal. However, magnetization measurements portray an extremely unusual response for a dilute paramagnet and do not exhibit the characteristic Curie-Weiss behavior expected for a weakly interacting material at high temperature. Electronic structure calculations confirm metallic behavior, but also indicate that each isolated band near the Fermi energy hosts non-trivial topologies including strong, weak and nodal components, with resultant topological surface states distinguishable from bulk states on the (001) surface. With half-filled flat bands apparent in the calculation but absence of long-range magnetic order, the unusual paramagnetic response suggests the dilute paramagnetic behavior in this quasicrystal approximant is surprising and may serve as a test of the fundamental assumptions that are taken for granted for the magnetic response of weakly interacting systems.
△ Less
Submitted 23 May, 2025;
originally announced May 2025.
-
A Multimodal Pipeline for Clinical Data Extraction: Applying Vision-Language Models to Scans of Transfusion Reaction Reports
Authors:
Henning Schäfer,
Cynthia S. Schmidt,
Johannes Wutzkowsky,
Kamil Lorek,
Lea Reinartz,
Johannes Rückert,
Christian Temme,
Britta Böckmann,
Peter A. Horn,
Christoph M. Friedrich
Abstract:
Despite the growing adoption of electronic health records, many processes still rely on paper documents, reflecting the heterogeneous real-world conditions in which healthcare is delivered. The manual transcription process is time-consuming and prone to errors when transferring paper-based data to digital formats. To streamline this workflow, this study presents an open-source pipeline that extrac…
▽ More
Despite the growing adoption of electronic health records, many processes still rely on paper documents, reflecting the heterogeneous real-world conditions in which healthcare is delivered. The manual transcription process is time-consuming and prone to errors when transferring paper-based data to digital formats. To streamline this workflow, this study presents an open-source pipeline that extracts and categorizes checkbox data from scanned documents. Demonstrated on transfusion reaction reports, the design supports adaptation to other checkbox-rich document types. The proposed method integrates checkbox detection, multilingual optical character recognition (OCR) and multilingual vision-language models (VLMs). The pipeline achieves high precision and recall compared against annually compiled gold-standards from 2017 to 2024. The result is a reduction in administrative workload and accurate regulatory reporting. The open-source availability of this pipeline encourages self-hosted parsing of checkbox forms.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
Subdomains of Post-COVID-Syndrome (PCS) -- A Population-Based Study
Authors:
Sabrina Ballhausen,
Anne-Kathrin Ruß,
Wolfgang Lieb,
Anna Horn,
Lilian Krist,
Julia Fricke,
Carmen Scheibenbogen,
Klaus F. Rabe,
Walter Maetzler,
Corina Maetzler,
Martin Laudien,
Derk Frank,
Jan Heyckendorf,
Olga Miljukov,
Karl Georg Haeusler,
Nour Eddine El Mokthari,
Martin Witzenrath,
Jörg Janne Vehreschild,
Katharina S. Appel,
Irina Chaplinskaya-Sobol,
Thalea Tamminga,
Carolin Nürnberger,
Lena Schmidbauer,
Caroline Morbach,
Stefan Störk
, et al. (6 additional authors not shown)
Abstract:
Post-COVID Syndrome (PCS), encompassing the multifaceted sequelae of COVID-19, can be severity-graded using a score comprising 12 different long-term symptom complexes. Acute COVID-19 severity and individual resilience were previously identified as key predictors of this score. This study validated these predictors and examined their relationship to PCS symptom complexes, using an expanded dataset…
▽ More
Post-COVID Syndrome (PCS), encompassing the multifaceted sequelae of COVID-19, can be severity-graded using a score comprising 12 different long-term symptom complexes. Acute COVID-19 severity and individual resilience were previously identified as key predictors of this score. This study validated these predictors and examined their relationship to PCS symptom complexes, using an expanded dataset (n=3,372) from the COVIDOM cohort study. Classification and Regression Tree (CART) analysis resolved the detailed relationship between the predictors and the constituting symptom complexes of the PCS score. Among newly recruited COVIDOM participants (n=1,930), the PCS score was again found to be associated with both its putative predictors. Of the score-constituting symptom complexes, neurological symptoms, sleep disturbance, and fatigue were predicted by individual resilience, whereas acute disease severity predicted exercise intolerance, chemosensory deficits, joint or muscle pain, signs of infection, and fatigue. These associations inspired the definition of two novel PCS scores that included the above-mentioned subsets of symptom complexes only. Both novel scores were inversely correlated with quality of life, measured by the EQ-5D-5L index. The newly defined scores may enhance the assessment of PCS severity, both in a research context and to delineate distinct PCS subdomains with different therapeutic and interventional needs in clinical practise.
△ Less
Submitted 10 March, 2025;
originally announced March 2025.
-
PATCH: a deep learning method to assess heterogeneity of artistic practice in historical paintings
Authors:
Andrew Van Horn,
Lauryn Smith,
Mahamad Mahmoud,
Michael McMaster,
Clara Pinchbeck,
Ina Martin,
Andrew Lininger,
Anthony Ingrisano,
Adam Lowe,
Carlos Bayod,
Elizabeth Bolman,
Kenneth Singer,
Michael Hinczewski
Abstract:
The history of art has seen significant shifts in the manner in which artworks are created, making understanding of creative processes a central question in technical art history. In the Renaissance and Early Modern period, paintings were largely produced by master painters directing workshops of apprentices who often contributed to projects. The masters varied significantly in artistic and manage…
▽ More
The history of art has seen significant shifts in the manner in which artworks are created, making understanding of creative processes a central question in technical art history. In the Renaissance and Early Modern period, paintings were largely produced by master painters directing workshops of apprentices who often contributed to projects. The masters varied significantly in artistic and managerial styles, meaning different combinations of artists and implements might be seen both between masters and within workshops or even individual canvases. Information on how different workshops were managed and the processes by which artworks were created remains elusive. Machine learning methods have potential to unearth new information about artists' creative processes by extending the analysis of brushwork to a microscopic scale. Analysis of workshop paintings, however, presents a challenge in that documentation of the artists and materials involved is sparse, meaning external examples are not available to train networks to recognize their contributions. Here we present a novel machine learning approach we call pairwise assignment training for classifying heterogeneity (PATCH) that is capable of identifying individual artistic practice regimes with no external training data, or "ground truth." The method achieves unsupervised results by supervised means, and outperforms both simple statistical procedures and unsupervised machine learning methods. We apply this method to two historical paintings by the Spanish Renaissance master, El Greco: The Baptism of Christ and Christ on the Cross with Landscape, and our findings regarding the former potentially challenge previous work that has assigned the painting to workshop members. Further, the results of our analyses create a measure of heterogeneity of artistic practice that can be used to characterize artworks across time and space.
△ Less
Submitted 3 March, 2025; v1 submitted 3 February, 2025;
originally announced February 2025.
-
Overhead Measurement Noise in Different Runtime Environments
Authors:
David Georg Reichelt,
Reiner Jung,
André van Hoorn
Abstract:
In order to detect performance changes, measurements are performed with the same execution environment. In cloud environments, the noise from different processes running on the same cluster nodes might change measurement results and thereby make performance changes hard to measure.
The benchmark MooBench determines the overhead of different observability tools and is executed continuously. In th…
▽ More
In order to detect performance changes, measurements are performed with the same execution environment. In cloud environments, the noise from different processes running on the same cluster nodes might change measurement results and thereby make performance changes hard to measure.
The benchmark MooBench determines the overhead of different observability tools and is executed continuously. In this study, we compare the suitability of different execution environments to benchmark the observability overhead using MooBench. To do so, we compare the execution times and standard deviation of MooBench in a cloud execution environment to three bare-metal execution environments. We find that bare metal servers have lower runtime and standard deviation for multi-threaded MooBench execution. Nevertheless, we see that performance changes up to 4.41% are detectable by GitHub actions, as long as only sequential workloads are examined.
△ Less
Submitted 8 November, 2024;
originally announced November 2024.
-
The linear targeting problem
Authors:
Kyle Bierly,
Stephan Ramon Garcia,
Roger A. Horn
Abstract:
For given real or complex $m \times n$ data matrices $X$, $Y$, we investigate when there is a matrix $A$ such that $AX = Y$, and $A$ is invertible, Hermitian, positive (semi)definite, unitary, an orthogonal projection, a reflection, complex symmetric, or normal.
For given real or complex $m \times n$ data matrices $X$, $Y$, we investigate when there is a matrix $A$ such that $AX = Y$, and $A$ is invertible, Hermitian, positive (semi)definite, unitary, an orthogonal projection, a reflection, complex symmetric, or normal.
△ Less
Submitted 24 April, 2025; v1 submitted 19 August, 2024;
originally announced August 2024.
-
Early Detection of Performance Regressions by Bridging Local Performance Data and Architectural Models
Authors:
Lizhi Liao,
Simon Eismann,
Heng Li,
Cor-Paul Bezemer,
Diego Elias Costa,
Andre van Hoorn,
Weiyi Shang
Abstract:
During software development, developers often make numerous modifications to the software to address existing issues or implement new features. However, certain changes may inadvertently have a detrimental impact on the overall system performance. To ensure that the performance of new software releases does not degrade, existing practices rely on system-level performance testing, such as load test…
▽ More
During software development, developers often make numerous modifications to the software to address existing issues or implement new features. However, certain changes may inadvertently have a detrimental impact on the overall system performance. To ensure that the performance of new software releases does not degrade, existing practices rely on system-level performance testing, such as load testing, or component-level performance testing to detect performance regressions. However, performance testing for the entire system is often expensive and time-consuming, posing challenges to adapting to the rapid release cycles common in modern DevOps practices. System-level performance testing cannot be conducted until the system is fully built and deployed. On the other hand, component-level testing focuses on isolated components, neglecting overall system performance and the impact of system workloads.
In this paper, we propose a novel approach to early detection of performance regressions by bridging the local performance data generated by component-level testing and the system-level architectural models. Our approach uses local performance data to identify deviations at the component level, and then propagate these deviations to the architectural model. We then use the architectural model to predict regressions in the performance of the overall system. We evaluate our approach on two open-source benchmark systems and show that it can effectively detect end-to-end system performance regressions from local performance deviations with different intensities and under various system workloads. More importantly, our approach can detect regressions as early as in the development phase, in contrast to existing approaches that require the system to be fully built and deployed. Our approach is lightweight and can complement traditional system performance testing when testing resources are scarce.
△ Less
Submitted 15 August, 2024;
originally announced August 2024.
-
Superconducting phase diagram in Bi$_x$Ni$_{1-x}$ thin films$\colon$ the effects of Bi stoichiometry on superconductivity
Authors:
Jihun Park,
Jarryd A. Horn,
Dylan J. Kirsch,
Rohit K. Pant,
Hyeok Yoon,
Sungha Baek,
Suchismita Sarker,
Apurva Mehta,
Xiaohang Zhang,
Seunghun Lee,
Richard Greene,
Johnpierre Paglione,
Ichiro Takeuchi
Abstract:
The Bi${-}$Ni binary system has been of interest due to possible unconventional superconductivity aroused therein, such as time-reversal symmetry breaking in Bi/Ni bilayers or the coexistence of superconductivity and ferromagnetism in Bi$_3$Ni crystals. While Ni acts as a ferromagnetic element in such systems, the role of strong spin-orbit-coupling element Bi in superconductivity has remained unex…
▽ More
The Bi${-}$Ni binary system has been of interest due to possible unconventional superconductivity aroused therein, such as time-reversal symmetry breaking in Bi/Ni bilayers or the coexistence of superconductivity and ferromagnetism in Bi$_3$Ni crystals. While Ni acts as a ferromagnetic element in such systems, the role of strong spin-orbit-coupling element Bi in superconductivity has remained unexplored. In this work, we systematically studied the effects of Bi stoichiometry on the superconductivity of Bi$_x$Ni$_{1-x}$ thin films (${x} \approx$ 0.5 to 0.9) fabricated via a composition-spread approach. The superconducting phase map of Bi$_x$Ni$_{1-x}$ thin films exhibited a superconducting composition region attributable to the intermetallic Bi$_3$Ni phase with different amount of excess Bi, revealed by synchrotron X-ray diffraction analysis. Interestingly, the mixed phase region with Bi$_3$Ni and Bi showed unusual increases in the superconducting transition temperature and residual resistance ratio as more Bi impurities were included, with the maximum ${T}_{c}$ ($=$ 4.2 K) observed at $x \approx$ 0.79. A correlation analysis of structural, electrical, and magneto-transport characteristics across the composition variation revealed that the unusual superconducting $"$dome$"$ is due to two competing roles of Bi$\colon$ impurity scattering and carrier doping. We found that the carrier doping effect is dominant in the mild doping regime (0.74 $\leq {x} \leq$ 0.79), while impurity scattering becomes more pronounced at larger Bi stoichiometry.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
WisPerMed at BioLaySumm: Adapting Autoregressive Large Language Models for Lay Summarization of Scientific Articles
Authors:
Tabea M. G. Pakull,
Hendrik Damm,
Ahmad Idrissi-Yaghir,
Henning Schäfer,
Peter A. Horn,
Christoph M. Friedrich
Abstract:
This paper details the efforts of the WisPerMed team in the BioLaySumm2024 Shared Task on automatic lay summarization in the biomedical domain, aimed at making scientific publications accessible to non-specialists. Large language models (LLMs), specifically the BioMistral and Llama3 models, were fine-tuned and employed to create lay summaries from complex scientific texts. The summarization perfor…
▽ More
This paper details the efforts of the WisPerMed team in the BioLaySumm2024 Shared Task on automatic lay summarization in the biomedical domain, aimed at making scientific publications accessible to non-specialists. Large language models (LLMs), specifically the BioMistral and Llama3 models, were fine-tuned and employed to create lay summaries from complex scientific texts. The summarization performance was enhanced through various approaches, including instruction tuning, few-shot learning, and prompt variations tailored to incorporate specific context information. The experiments demonstrated that fine-tuning generally led to the best performance across most evaluated metrics. Few-shot learning notably improved the models' ability to generate relevant and factually accurate texts, particularly when using a well-crafted prompt. Additionally, a Dynamic Expert Selection (DES) mechanism to optimize the selection of text outputs based on readability and factuality metrics was developed. Out of 54 participants, the WisPerMed team reached the 4th place, measured by readability, factuality, and relevance. Determined by the overall score, our approach improved upon the baseline by approx. 5.5 percentage points and was only approx 1.5 percentage points behind the first place.
△ Less
Submitted 23 September, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
ROCOv2: Radiology Objects in COntext Version 2, an Updated Multimodal Image Dataset
Authors:
Johannes Rückert,
Louise Bloch,
Raphael Brüngel,
Ahmad Idrissi-Yaghir,
Henning Schäfer,
Cynthia S. Schmidt,
Sven Koitka,
Obioma Pelka,
Asma Ben Abacha,
Alba G. Seco de Herrera,
Henning Müller,
Peter A. Horn,
Felix Nensa,
Christoph M. Friedrich
Abstract:
Automated medical image analysis systems often require large amounts of training data with high quality labels, which are difficult and time consuming to generate. This paper introduces Radiology Object in COntext version 2 (ROCOv2), a multimodal dataset consisting of radiological images and associated medical concepts and captions extracted from the PMC Open Access subset. It is an updated versio…
▽ More
Automated medical image analysis systems often require large amounts of training data with high quality labels, which are difficult and time consuming to generate. This paper introduces Radiology Object in COntext version 2 (ROCOv2), a multimodal dataset consisting of radiological images and associated medical concepts and captions extracted from the PMC Open Access subset. It is an updated version of the ROCO dataset published in 2018, and adds 35,705 new images added to PMC since 2018. It further provides manually curated concepts for imaging modalities with additional anatomical and directional concepts for X-rays. The dataset consists of 79,789 images and has been used, with minor modifications, in the concept detection and caption prediction tasks of ImageCLEFmedical Caption 2023. The dataset is suitable for training image annotation models based on image-caption pairs, or for multi-label image classification using Unified Medical Language System (UMLS) concepts provided with each image. In addition, it can serve for pre-training of medical domain models, and evaluation of deep learning models for multi-task learning.
△ Less
Submitted 18 June, 2024; v1 submitted 16 May, 2024;
originally announced May 2024.
-
The Highly Durable Antibacterial Gel-like Coatings for Textiles
Authors:
Seyedali Mirmohammadsadeghi,
Davis Juhas,
Mikhail Parker,
Kristina Peranidze,
Dwight Austin Van Horn,
Aayushi Sharma,
Dhruvi Patel,
Tatyana A. Sysoeva,
Vladislav Klepov,
Vladimir Reukov
Abstract:
Hospital-acquired infections are considered a priority for public health systems, which poses a significant burden for society. High-touch surfaces of healthcare centers, including textiles, provide a suitable environment for pathogenic bacteria to grow, necessitating incorporating effective antibacterial agents into textiles. This paper introduces a highly durable antibacterial gel-like solution,…
▽ More
Hospital-acquired infections are considered a priority for public health systems, which poses a significant burden for society. High-touch surfaces of healthcare centers, including textiles, provide a suitable environment for pathogenic bacteria to grow, necessitating incorporating effective antibacterial agents into textiles. This paper introduces a highly durable antibacterial gel-like solution, Silver Shell finish, which contains chitosan-bound silver chloride microparticles. The study investigates the coating's environmental impact, health risks, and durability during repeated washing. The structure of the Silver Shell finish was studied using Transmission Electron Microscopy (TEM) and Energy-Dispersive X-ray Spectroscopy (EDX). TEM images showed a core-shell structure, with chitosan forming a protective shell around groupings of silver micro-particles. Field Emission Scanning Electron Microscopy (FESEM) demonstrated the uniform deposition of Silver Shell on the surface of fabrics. AATCC Test Method 100 was employed to quantitatively analyze the antibacterial properties of fabrics coated with silver microparticles. Two types of bacteria, Staphylococcus aureus (S. aureus) and Escherichia coli (E. coli) were used in this study. The antibacterial results showed that after 75 wash cycles, a 100% reduction for both S. aureus and E. coli in the coated samples using crosslinking agents was observed. The coated samples without a crosslinking agent exhibited a 99.88% and 99.81% reduction for S. aureus and E. coli after 50 washing cycles. AATCC-147 was performed to investigate the coated samples' leaching properties and the crosslinking agent's effect against S. aureus and E. coli. All coated samples demonstrated remarkable antibacterial efficacy even after 75 wash cycles.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Comprehensive Study on German Language Models for Clinical and Biomedical Text Understanding
Authors:
Ahmad Idrissi-Yaghir,
Amin Dada,
Henning Schäfer,
Kamyar Arzideh,
Giulia Baldini,
Jan Trienes,
Max Hasin,
Jeanette Bewersdorff,
Cynthia S. Schmidt,
Marie Bauer,
Kaleb E. Smith,
Jiang Bian,
Yonghui Wu,
Jörg Schlötterer,
Torsten Zesch,
Peter A. Horn,
Christin Seifert,
Felix Nensa,
Jens Kleesiek,
Christoph M. Friedrich
Abstract:
Recent advances in natural language processing (NLP) can be largely attributed to the advent of pre-trained language models such as BERT and RoBERTa. While these models demonstrate remarkable performance on general datasets, they can struggle in specialized domains such as medicine, where unique domain-specific terminologies, domain-specific abbreviations, and varying document structures are commo…
▽ More
Recent advances in natural language processing (NLP) can be largely attributed to the advent of pre-trained language models such as BERT and RoBERTa. While these models demonstrate remarkable performance on general datasets, they can struggle in specialized domains such as medicine, where unique domain-specific terminologies, domain-specific abbreviations, and varying document structures are common. This paper explores strategies for adapting these models to domain-specific requirements, primarily through continuous pre-training on domain-specific data. We pre-trained several German medical language models on 2.4B tokens derived from translated public English medical data and 3B tokens of German clinical data. The resulting models were evaluated on various German downstream tasks, including named entity recognition (NER), multi-label classification, and extractive question answering. Our results suggest that models augmented by clinical and translation-based pre-training typically outperform general domain models in medical contexts. We conclude that continuous pre-training has demonstrated the ability to match or even exceed the performance of clinical models trained from scratch. Furthermore, pre-training on clinical data or leveraging translated texts have proven to be reliable methods for domain adaptation in medical NLP tasks.
△ Less
Submitted 8 May, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
Probing $p$-wave superconductivity in UTe$_2$ via point-contact junctions
Authors:
Hyeok Yoon,
Yun Suk Eo,
Jihun Park,
Jarryd A. Horn,
Ryan G. Dorman,
Shanta R. Saha,
Ian M. Hayes,
Ichiro Takeuchi,
Philip M. R. Brydon,
Johnpierre Paglione
Abstract:
Uranium ditelluride (UTe$_2$) is the strongest contender to date for a $p$-wave superconductor in bulk form. Here we perform a spectroscopic study of the ambient pressure superconducting phase of UTe$_2$, measuring conductance through point-contact junctions formed by metallic contacts on different crystalline facets down to 250 mK and up to 18 T. Fitting a range of qualitatively varying spectra w…
▽ More
Uranium ditelluride (UTe$_2$) is the strongest contender to date for a $p$-wave superconductor in bulk form. Here we perform a spectroscopic study of the ambient pressure superconducting phase of UTe$_2$, measuring conductance through point-contact junctions formed by metallic contacts on different crystalline facets down to 250 mK and up to 18 T. Fitting a range of qualitatively varying spectra with a Blonder-Tinkham-Klapwijk(BTK) model for $p$-wave pairing, we can extract gap amplitude and interface barrier strength for each junction. We find good agreement with the data for a $p_y$ -wave gap function with amplitude in 0.26 $\pm$ 0.06 meV. Our work provides spectroscopic evidence for a gap structure consistent with the proposed spin-triplet pairing in the superconducting state of UTe$_2$.
△ Less
Submitted 4 September, 2024; v1 submitted 1 March, 2024;
originally announced March 2024.
-
Disordered 2D ferromagnetism at the surface of FeSi
Authors:
Keenan E. Avers,
Yun Suk Eo,
Hyeok Yoon,
Jarryd A. Horn,
Shanta R. Saha,
Alonso Suarez,
Peter Zavalij,
Johnpierre Paglione
Abstract:
FeSi is a curious example of a $d$-electron system that manifests many of the same phenomena associated with $f$-electron Kondo insulators, including conducting surface states with potentially non-trivial topology. Here we investigate the magnetization and magnetotransport of these surface states and how a 2D ferromagnetic state at the surface of FeSi influences the surface conductivity. We confir…
▽ More
FeSi is a curious example of a $d$-electron system that manifests many of the same phenomena associated with $f$-electron Kondo insulators, including conducting surface states with potentially non-trivial topology. Here we investigate the magnetization and magnetotransport of these surface states and how a 2D ferromagnetic state at the surface of FeSi influences the surface conductivity. We confirm the 2D ferromagnetism via a systematic study of magnetization on groups of filtered fragments with increasing surface area-to-volume ratios, identifying characteristic temperatures and magnetic fields associated with the ordered state. The paramagnetic to ferromagnetic transition appears broadened, suggesting disorder, which allows spin fluctuations to manifest up to at least 9 T at 2 K. This highlights the need to understand the relation between the disorder of the 2D ferromagnetism and the surface conductivity in FeSi.
△ Less
Submitted 30 September, 2024; v1 submitted 21 February, 2024;
originally announced February 2024.
-
Introducing Interactions in Multi-Objective Optimization of Software Architectures
Authors:
Vittorio Cortellessa,
J. Andres Diaz-Pace,
Daniele Di Pompeo,
Sebastian Frank,
Pooyan Jamshidi,
Michele Tucci,
André van Hoorn
Abstract:
Software architecture optimization aims to enhance non-functional attributes like performance and reliability while meeting functional requirements. Multi-objective optimization employs metaheuristic search techniques, such as genetic algorithms, to explore feasible architectural changes and propose alternatives to designers. However, this resource-intensive process may not always align with pract…
▽ More
Software architecture optimization aims to enhance non-functional attributes like performance and reliability while meeting functional requirements. Multi-objective optimization employs metaheuristic search techniques, such as genetic algorithms, to explore feasible architectural changes and propose alternatives to designers. However, this resource-intensive process may not always align with practical constraints. This study investigates the impact of designer interactions on multi-objective software architecture optimization. Designers can intervene at intermediate points in the fully automated optimization process, making choices that guide exploration towards more desirable solutions. Through several controlled experiments as well as an initial user study (14 subjects), we compare this interactive approach with a fully automated optimization process, which serves as a baseline. The findings demonstrate that designer interactions lead to a more focused solution space, resulting in improved architectural quality. By directing the search towards regions of interest, the interaction uncovers architectures that remain unexplored in the fully automated process. In the user study, participants found that our interactive approach provides a better trade-off between sufficient exploration of the solution space and the required computation time.
△ Less
Submitted 19 December, 2024; v1 submitted 29 August, 2023;
originally announced August 2023.
-
Learning From Each Other: How Are Architectural Mistakes Communicated in Industry?
Authors:
Marion Wiese,
Axel-Frederik Brand,
André van Hoorn
Abstract:
Context. Own experiences and faulty decisions can be an important source of information for software architects. The experiences and mistakes of other architects can also be valuable information sources. Goal. Under the assumption that the knowledge about faulty decisions, i.e., mistakes, regarding software architecture is not shared adequately in practice, this work qualitatively investigates the…
▽ More
Context. Own experiences and faulty decisions can be an important source of information for software architects. The experiences and mistakes of other architects can also be valuable information sources. Goal. Under the assumption that the knowledge about faulty decisions, i.e., mistakes, regarding software architecture is not shared adequately in practice, this work qualitatively investigates the handling and particularly communication of those mistakes by software architects. Method. We conducted a grounded-theory study in which we interviewed ten German software architects from various domains. Results. We identified software architects' definitions of architectural mistakes, their handling of these mistakes, and their preferred communication strategies regarding these mistakes. We found that architects communicate mistakes mainly within their project teams and seldom within or across companies. Conclusions. We derived strategies to make learning and prevention of mistakes more effective. To share experiences and knowledge beyond architects' peer groups, companies should invest more effort in discussing mistakes more consciously and create an environment where mistakes can be discussed openly.
△ Less
Submitted 10 July, 2023;
originally announced July 2023.
-
Radicalized by Thinness: Using a Model of Radicalization to Understand Pro-Anorexia Communities on Twitter
Authors:
Kristina Lerman,
Aryan Karnati,
Shuchan Zhou,
Siyi Chen,
Sudesh Kumar,
Zihao He,
Joanna Yau,
Abigail Horn
Abstract:
The rise in eating disorders, a condition with serious health complications, has been linked to the proliferation of idealized body images on social media platforms. However, the relationship between social media and eating disorders is more complex, with online platforms potentially enabling harmful behaviors by linking people to ``pro-ana'' communities that promote eating disorders. We conceptua…
▽ More
The rise in eating disorders, a condition with serious health complications, has been linked to the proliferation of idealized body images on social media platforms. However, the relationship between social media and eating disorders is more complex, with online platforms potentially enabling harmful behaviors by linking people to ``pro-ana'' communities that promote eating disorders. We conceptualize the growth of harmful pro-ana communities as a process of online radicalization. We show that a model of radicalization explains how individuals are driven to conversations about extreme behaviors, like fasting, to achieve the ``thin body'' goal, and how these conversations are validated by pro-ana communities. By facilitating social connections to like-minded others, a shared group identity and emotional support, social media platforms can trap individuals within toxic echo chambers that normalize extreme disordered eating behaviors and other forms of self-harm. Characterizing and quantifying the role of online communities in amplifying harmful conversations will support the development of strategies to mitigate their impact and promote better mental health.
△ Less
Submitted 30 August, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
Extraordinary Bulk Insulating Behavior in the Strongly Correlated Materials FeSi and FeSb$_2$
Authors:
Yun Suk Eo,
Keenan Avers,
Jarryd A. Horn,
Hyeok Yoon,
Shanta Saha,
Alonso Suarez,
Michael S. Fuhrer,
Johnpierre Paglione
Abstract:
4$f$ electron-based topological Kondo insulators have long been researched for their potential to conduct electric current via protected surface states, while simultaneously exhibiting unusually robust insulating behavior in their interiors. To this end, we have investigated the electrical transport of the 3$d$-based correlated insulators FeSi and FeSb$_2$, which have exhibited enough similarities…
▽ More
4$f$ electron-based topological Kondo insulators have long been researched for their potential to conduct electric current via protected surface states, while simultaneously exhibiting unusually robust insulating behavior in their interiors. To this end, we have investigated the electrical transport of the 3$d$-based correlated insulators FeSi and FeSb$_2$, which have exhibited enough similarities to their $f$ electron cousins to warrant investigation. By using a double-sided Corbino disk transport geometry, we show unambiguous evidence of surface conductance in both of these Fe-based materials. In addition, by using a 4-terminal Corbino inverted resistance technique, we extract the bulk resistivity as a function of temperature. Similar to topological Kondo insulator SmB$_6$, the bulk resistivity of FeSi and FeSb$_2$ are confirmed to exponentially increase by up to 9 orders of magnitude from room temperature to the lowest accessible temperature. This demonstrates that these materials are excellent bulk insulators, providing an ideal platform for studying correlated 2D physics.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Modular Software for Real-Time Quantum Control Systems
Authors:
Leon Riesebos,
Brad Bondurant,
Jacob Whitlow,
Junki Kim,
Mark Kuzyk,
Tianyi Chen,
Samuel Phiri,
Ye Wang,
Chao Fang,
Andrew Van Horn,
Jungsang Kim,
Kenneth R. Brown
Abstract:
Real-time control software and hardware is essential for operating quantum computers. In particular, the software plays a crucial role in bridging the gap between quantum programs and the quantum system. Unfortunately, current control software is often optimized for a specific system at the cost of flexibility and portability. We propose a systematic design strategy for modular real-time quantum c…
▽ More
Real-time control software and hardware is essential for operating quantum computers. In particular, the software plays a crucial role in bridging the gap between quantum programs and the quantum system. Unfortunately, current control software is often optimized for a specific system at the cost of flexibility and portability. We propose a systematic design strategy for modular real-time quantum control software and demonstrate that modular control software can reduce the execution time overhead of kernels by 63.3% on average while not increasing the binary size. Our analysis shows that modular control software for two distinctly different systems can share between 49.8% and 91.0% of covered code statements. To demonstrate the modularity and portability of our software architecture, we run a portable randomized benchmarking experiment on two different ion-trap quantum systems.
△ Less
Submitted 25 October, 2022;
originally announced October 2022.
-
Trajectory Planning for Hybrid Unmanned Aerial Underwater Vehicles with Smooth Media Transition
Authors:
Pedro Miranda Pinheiro,
Armando Alves Neto,
Ricardo Bedin Grando,
Cesar Bastos da Silva,
Vivian Misaki Aoki,
Dayana Cardoso,
Alexandre Campos Horn,
Paulo Lilles Jorge Drews-Jr
Abstract:
In the last decade, a great effort has been employed in the study of Hybrid Unmanned Aerial Underwater Vehicles, robots that can easily fly and dive into the water with different levels of mechanical adaptation. However, most of this literature is concentrated on physical design, practical issues of construction, and, more recently, low-level control strategies. Little has been done in the context…
▽ More
In the last decade, a great effort has been employed in the study of Hybrid Unmanned Aerial Underwater Vehicles, robots that can easily fly and dive into the water with different levels of mechanical adaptation. However, most of this literature is concentrated on physical design, practical issues of construction, and, more recently, low-level control strategies. Little has been done in the context of high-level intelligence, such as motion planning and interactions with the real world. Therefore, we proposed in this paper a trajectory planning approach that allows collision avoidance against unknown obstacles and smooth transitions between aerial and aquatic media. Our method is based on a variant of the classic Rapidly-exploring Random Tree, whose main advantages are the capability to deal with obstacles, complex nonlinear dynamics, model uncertainties, and external disturbances. The approach uses the dynamic model of the \hydrone, a hybrid vehicle proposed with high underwater performance, but we believe it can be easily generalized to other types of aerial/aquatic platforms. In the experimental section, we present simulated results in environments filled with obstacles, where the robot is commanded to perform different media movements, demonstrating the applicability of our strategy.
△ Less
Submitted 27 December, 2021;
originally announced December 2021.
-
DBSegment: Fast and robust segmentation of deep brain structures -- Evaluation of transportability across acquisition domains
Authors:
Mehri Baniasadi,
Mikkel V. Petersen,
Jorge Goncalves,
Andreas Horn,
Vanja Vlasov,
Frank Hertel,
Andreas Husch
Abstract:
Segmenting deep brain structures from magnetic resonance images is important for patient diagnosis, surgical planning, and research. Most current state-of-the-art solutions follow a segmentation-by-registration approach, where subject MRIs are mapped to a template with well-defined segmentations. However, registration-based pipelines are time-consuming, thus, limiting their clinical use. This pape…
▽ More
Segmenting deep brain structures from magnetic resonance images is important for patient diagnosis, surgical planning, and research. Most current state-of-the-art solutions follow a segmentation-by-registration approach, where subject MRIs are mapped to a template with well-defined segmentations. However, registration-based pipelines are time-consuming, thus, limiting their clinical use. This paper uses deep learning to provide a robust and efficient deep brain segmentation solution. The method consists of a pre-processing step to conform all MRI images to the same orientation, followed by a convolutional neural network using the nnU-Net framework. We use a total of 14 datasets from both research and clinical collections. Of these, seven were used for training and validation and seven were retained for independent testing. We trained the network to segment 30 deep brain structures, as well as a brain mask, using labels generated from a registration-based approach. We evaluated the generalizability of the network by performing a leave-one-dataset-out cross-validation, and extensive testing on external datasets. Furthermore, we assessed cross-domain transportability by evaluating the results separately on different domains. We achieved an average DSC of 0.89 $\pm$ 0.04 on the independent testing datasets when compared to the registration-based gold standard. On our test system, the computation time decreased from 42 minutes for a reference registration-based pipeline to 1 minute. Our proposed method is fast, robust, and generalizes with high reliability. It can be extended to the segmentation of other brain structures. The method is publicly available on GitHub, as well as a pip package for convenient usage.
△ Less
Submitted 19 May, 2022; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Toward Personalized Medicine in Connectomic Deep Brain Stimulation
Authors:
Barbara Hollunder,
Nanditha Rajamani,
Shan H. Siddiqi,
Carsten Finke,
Andrea A. Kühn,
Helen S. Mayberg,
Michael D. Fox,
Clemens Neudorfer,
Andreas Horn
Abstract:
At the group-level, deep brain stimulation leads to significant therapeutic benefit in a multitude of neurological and neuropsychiatric disorders. At the single-patient level, however, symptoms may sometimes persist despite "optimal" electrode placement at established treatment coordinates. This may be partly explained by limitations of disease-centric strategies that are unable to account for het…
▽ More
At the group-level, deep brain stimulation leads to significant therapeutic benefit in a multitude of neurological and neuropsychiatric disorders. At the single-patient level, however, symptoms may sometimes persist despite "optimal" electrode placement at established treatment coordinates. This may be partly explained by limitations of disease-centric strategies that are unable to account for heterogeneous phenotypes and comorbidities observed in clinical practice. Instead, tailoring electrode placement and programming to individual patients' symptom profiles may increase the fraction of top responding patients. Here, we propose a three-step, circuit-based framework that aims to develop patient-specific treatment targets that address the unique symptom constellation prevalent in each patient. First, we describe how a symptom network target library could be established by mapping beneficial or undesirable DBS effects to distinct circuits based on (retrospective) group-level data. Second, we suggest ways of matching the resulting symptom networks to circuits defined in the individual patient (template matching). Third, we introduce network blending as a strategy to calculate optimal stimulation targets and parameters by selecting and weighting a set of symptom-specific networks based on the symptom profile and subjective priorities of the individual patient. We integrate the approach with published literature and conclude by discussing limitations and future challenges.
△ Less
Submitted 25 September, 2021;
originally announced September 2021.
-
A Case Study on the Stability of Performance Tests for Serverless Applications
Authors:
Simon Eismann,
Diego Elias Costa,
Lizhi Liao,
Cor-Paul Bezemer,
Weiyi Shang,
André van Hoorn,
Samuel Kounev
Abstract:
Context. While in serverless computing, application resource management and operational concerns are generally delegated to the cloud provider, ensuring that serverless applications meet their performance requirements is still a responsibility of the developers. Performance testing is a commonly used performance assessment practice; however, it traditionally requires visibility of the resource env…
▽ More
Context. While in serverless computing, application resource management and operational concerns are generally delegated to the cloud provider, ensuring that serverless applications meet their performance requirements is still a responsibility of the developers. Performance testing is a commonly used performance assessment practice; however, it traditionally requires visibility of the resource environment.
Objective. In this study, we investigate whether performance tests of serverless applications are stable, that is, if their results are reproducible, and what implications the serverless paradigm has for performance tests.
Method. We conduct a case study where we collect two datasets of performance test results: (a) repetitions of performance tests for varying memory size and load intensities and (b) three repetitions of the same performance test every day for ten months.
Results. We find that performance tests of serverless applications are comparatively stable if conducted on the same day. However, we also observe short-term performance variations and frequent long-term performance changes.
Conclusion. Performance tests for serverless applications can be stable; however, the serverless model impacts the planning, execution, and analysis of performance tests.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
$c$-axis transport in UTe$_{2}$: Evidence of Three Dimensional Conductivity Component
Authors:
Yun Suk Eo,
Shouzheng Liu,
Shanta R. Saha,
Hyunsoo Kim,
Sheng Ran,
Jarryd A. Horn,
Halyna Hodovanets,
John Collini,
Tristin Metz,
Wesley T. Fuhrman,
Andriy H. Nevidomskyy,
Jonathan D. Denlinger,
Nicholas P. Butch,
Michael S. Fuhrer,
L. Andrew Wray,
Johnpierre Paglione
Abstract:
We study the temperature dependence of electrical resistivity for currents directed along all crystallographic axes of the spin-triplet superconductor UTe$_{2}$. We focus particularly on an accurate determination of the resistivity along the $c$-axis ($ρ_c$) by using a generalized Montgomery technique that allows extraction of crystallographic resistivity components from a single sample. In contra…
▽ More
We study the temperature dependence of electrical resistivity for currents directed along all crystallographic axes of the spin-triplet superconductor UTe$_{2}$. We focus particularly on an accurate determination of the resistivity along the $c$-axis ($ρ_c$) by using a generalized Montgomery technique that allows extraction of crystallographic resistivity components from a single sample. In contrast to expectations from the observed highly anisotropic band structure, our measurement of the absolute values of resistivities in all current directions reveals a surprisingly nearly isotropic transport behavior at temperatures above Kondo coherence, with $ρ_c \sim ρ_b \sim 2ρ_a$, that evolves to reveal qualitatively distinct behaviors on cooling. The temperature dependence of $ρ_c$ exhibits a peak at a temperature much lower than the onset of Kondo coherence observed in $ρ_a$ and $ρ_b$, consistent with features in magnetotransport and magnetization that point to a magnetic origin. A comparison to the temperature-dependent evolution of the scattering rate observed in angle-resolved photoemission spectroscopy experiments provides important insights into the underlying electronic structure necessary for building a microscopic model of superconductivity in UTe$_{2}$.
△ Less
Submitted 11 August, 2022; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services
Authors:
Vilc Rufino,
Mateus Nogueira,
Alberto Avritzer,
Daniel Menasché,
Barbara Russo,
Andrea Janes,
Vincenzo Ferme,
André Van Hoorn,
Henning Schulz,
Cabral Lima
Abstract:
Anomaly detection systems aim to detect and report attacks or unexpected behavior in networked systems. Previous work has shown that anomalies have an impact on system performance, and that performance signatures can be effectively used for implementing an IDS. In this paper, we present an analytical and an experimental study on the trade-off between anomaly detection based on performance signatur…
▽ More
Anomaly detection systems aim to detect and report attacks or unexpected behavior in networked systems. Previous work has shown that anomalies have an impact on system performance, and that performance signatures can be effectively used for implementing an IDS. In this paper, we present an analytical and an experimental study on the trade-off between anomaly detection based on performance signatures and system scalability. The proposed approach combines analytical modeling and load testing to find optimal configurations for the signature-based IDS. We apply a heavy-tail bi-modal modeling approach, where "long" jobs represent large resource consuming transactions, e.g., generated by DDoS attacks; the model was parametrized using results obtained from controlled experiments. For performance purposes, mean response time is the key metric to be minimized, whereas for security purposes, response time variance and classification accuracy must be taken into account. The key insights from our analysis are: (i) there is an optimal number of servers which minimizes the response time variance, (ii) the sweet-spot number of servers that minimizes response time variance and maximizes classification accuracy is typically smaller than or equal to the one that minimizes mean response time. Therefore, for security purposes, it may be worth slightly sacrificing performance to increase classification accuracy.
△ Less
Submitted 24 December, 2020;
originally announced December 2020.
-
A Precise and Expressive Lattice-theoretical Framework for Efficient Network Verification
Authors:
Alex Horn,
Ali Kheradmand,
Mukul R. Prasad
Abstract:
Network verification promises to detect errors, such as black holes and forwarding loops, by logically analyzing the control or data plane. To do so efficiently, the state-of-the-art (e.g., Veriflow) partitions packet headers with identical forwarding behavior into the same packet equivalence class (PEC).
Recently, Yang and Lam showed how to construct the minimal set of PECs, called atomic predi…
▽ More
Network verification promises to detect errors, such as black holes and forwarding loops, by logically analyzing the control or data plane. To do so efficiently, the state-of-the-art (e.g., Veriflow) partitions packet headers with identical forwarding behavior into the same packet equivalence class (PEC).
Recently, Yang and Lam showed how to construct the minimal set of PECs, called atomic predicates. Their construction uses Binary Decision Diagrams (BDDs). However, BDDs have been shown to incur significant overhead per packet header bit, performing poorly when analyzing large-scale data centers. The overhead of atomic predicates prompted ddNF to devise a specialized data structure of Ternary Bit Vectors (TBV) instead.
However, TBVs are strictly less expressive than BDDs. Moreover, unlike atomic predicates, ddNF's set of PECs is not minimal. We show that ddNF's non-minimality is due to empty PECs. In addition, empty PECs are shown to trigger wrong analysis results. This reveals an inherent tension between precision, expressiveness and performance in formal network verification.
Our paper resolves this tension through a new lattice-theoretical PEC-construction algorithm, #PEC, that advances the field as follows: (i) #PEC can encode more kinds of forwarding rules (e.g., ip-tables) than ddNF and Veriflow, (ii) #PEC verifies a wider class of errors (e.g., shadowed rules) than ddNF, and (iii) on a broad range of real-world datasets, #PEC is 10X faster than atomic predicates. By achieving precision, expressiveness and performance, this paper answers a longstanding quest that has spanned three generations of formal network analysis techniques.
△ Less
Submitted 23 August, 2019;
originally announced August 2019.
-
How is Performance Addressed in DevOps? A Survey on Industrial Practices
Authors:
Cor-Paul Bezemer,
Simon Eismann,
Vincenzo Ferme,
Johannes Grohmann,
Robert Heinrich,
Pooyan Jamshidi,
Weiyi Shang,
André van Hoorn,
Monica Villaviencio,
Jürgen Walter,
Felix Willnecker
Abstract:
DevOps is a modern software engineering paradigm that is gaining widespread adoption in industry. The goal of DevOps is to bring software changes into production with a high frequency and fast feedback cycles. This conflicts with software quality assurance activities, particularly with respect to performance. For instance, performance evaluation activities -- such as load testing -- require a cons…
▽ More
DevOps is a modern software engineering paradigm that is gaining widespread adoption in industry. The goal of DevOps is to bring software changes into production with a high frequency and fast feedback cycles. This conflicts with software quality assurance activities, particularly with respect to performance. For instance, performance evaluation activities -- such as load testing -- require a considerable amount of time to get statistically significant results.
We conducted an industrial survey to get insights into how performance is addressed in industrial DevOps settings. In particular, we were interested in the frequency of executing performance evaluations, the tools being used, the granularity of the obtained performance data, and the use of model-based techniques. The survey responses, which come from a wide variety of participants from different industry sectors, indicate that the complexity of performance engineering approaches and tools is a barrier for wide-spread adoption of performance analysis in DevOps. The implication of our results is that performance analysis tools need to have a short learning curve, and should be easy to integrate into the DevOps pipeline.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
Locating the Source of Large-scale Diffusion of Foodborne Contamination
Authors:
Abigail L. Horn,
Hanno Friedrich
Abstract:
We study the problem of identifying the source of emerging large-scale outbreaks of foodborne disease. To solve the source identification problem we formulate a probabilistic model of the contamination diffusion process as a random walk on a network and derive the maximum likelihood estimator for the source location. By modeling the transmission process as a random walk, we are able to develop a n…
▽ More
We study the problem of identifying the source of emerging large-scale outbreaks of foodborne disease. To solve the source identification problem we formulate a probabilistic model of the contamination diffusion process as a random walk on a network and derive the maximum likelihood estimator for the source location. By modeling the transmission process as a random walk, we are able to develop a novel, computationally tractable solution that accounts for all possible paths of travel through the network. This is in contrast to existing approaches to network source identification, which assume that the contamination travels along either the shortest or highest probability paths. We demonstrate the benefits of the multiple-paths approach through application to different network topologies, including stylized models of food supply network structure and real data from the 2011 EHEC outbreak in Germany. We show significant improvements in accuracy and reliability compared with the relevant state-of-the-art approach to source identification. Beyond foodborne disease, these methods should find application in identifying the source of spread in network-based diffusion processes more generally, including in networks not well approximated by tree-like structure.
△ Less
Submitted 8 May, 2018;
originally announced May 2018.
-
diagnoseIT: Expertengestützte automatische Diagnose von Performance-Probleme in Enterprise-Anwendungen (Abschlussbericht)
Authors:
Christoph Heger,
André van Hoorn,
Dušan Okanovic,
Stefan Siegl,
Christian Vögele,
Alexander Wert
Abstract:
This is the final report of the collaborative research project diagnoseIT on expert-guided automatic diagnosis of performance problems in enterprise applications.
This is the final report of the collaborative research project diagnoseIT on expert-guided automatic diagnosis of performance problems in enterprise applications.
△ Less
Submitted 10 January, 2018;
originally announced February 2018.
-
An Efficient Method for Uncertainty Propagation in Robust Software Performance Estimation
Authors:
Aldeida Aleti,
Catia Trubiani,
André van Hoorn,
Pooyan Jamshidi
Abstract:
Software engineers often have to estimate the performance of a software system before having full knowledge of the system parameters, such as workload and operational profile. These uncertain parameters inevitably affect the accuracy of quality evaluations, and the ability to judge if the system can continue to fulfil performance requirements if parameter results are different from expected. Previ…
▽ More
Software engineers often have to estimate the performance of a software system before having full knowledge of the system parameters, such as workload and operational profile. These uncertain parameters inevitably affect the accuracy of quality evaluations, and the ability to judge if the system can continue to fulfil performance requirements if parameter results are different from expected. Previous work has addressed this problem by modelling the potential values of uncertain parameters as probability distribution functions, and estimating the robustness of the system using Monte Carlo-based methods. These approaches require a large number of samples, which results in high computational cost and long waiting times.
To address the computational inefficiency of existing approaches, we employ Polynomial Chaos Expansion (PCE) as a rigorous method for uncertainty propagation and further extend its use to robust performance estimation. The aim is to assess if the software system is robust, i.e., it can withstand possible changes in parameter values, and continue to meet performance requirements. PCE is a very efficient technique, and requires significantly less computations to accurately estimate the distribution of performance indices. Through three very different case studies from different phases of software development and heterogeneous application domains, we show that PCE can accurately (>97\%) estimate the robustness of various performance indices, and saves up to 225 hours of performance evaluation time when compared to Monte Carlo Simulation.
△ Less
Submitted 14 January, 2018;
originally announced January 2018.
-
Symplectic spaces and pairs of symmetric and nonsingular skew-symmetric matrices under congruence
Authors:
Victor A. Bovdi,
Roger A. Horn,
Mohamed A. Salim,
Vladimir V. Sergeichuk
Abstract:
Let $\mathbb F$ be a field of characteristic not $2$, and let $(A,B)$ be a pair of $n\times n$ matrices over $\mathbb F$, in which $A$ is symmetric and $B$ is skew-symmetric. A canonical form of $(A,B)$ with respect to congruence transformations $(S^TAS,S^TBS)$ was given by Sergeichuk (1988) up to classification of symmetric and Hermitian forms over finite extensions of $\mathbb F$. We obtain a si…
▽ More
Let $\mathbb F$ be a field of characteristic not $2$, and let $(A,B)$ be a pair of $n\times n$ matrices over $\mathbb F$, in which $A$ is symmetric and $B$ is skew-symmetric. A canonical form of $(A,B)$ with respect to congruence transformations $(S^TAS,S^TBS)$ was given by Sergeichuk (1988) up to classification of symmetric and Hermitian forms over finite extensions of $\mathbb F$. We obtain a simpler canonical form of $(A,B)$ if $B$ is nonsingular. Such a pair $(A,B)$ defines a quadratic form on a symplectic space, that is, on a vector space with scalar product given by a nonsingular skew-symmetric form. As an application, we obtain known canonical matrices of quadratic forms and Hamiltonian operators on real and complex symplectic spaces.
△ Less
Submitted 29 September, 2017;
originally announced September 2017.
-
Report from GI-Dagstuhl Seminar 16394: Software Performance Engineering in the DevOps World
Authors:
Andre van Hoorn,
Pooyan Jamshidi,
Philipp Leitner,
Ingo Weber
Abstract:
This report documents the program and the outcomes of GI-Dagstuhl Seminar 16394 "Software Performance Engineering in the DevOps World".
The seminar addressed the problem of performance-aware DevOps. Both, DevOps and performance engineering have been growing trends over the past one to two years, in no small part due to the rise in importance of identifying performance anomalies in the operations…
▽ More
This report documents the program and the outcomes of GI-Dagstuhl Seminar 16394 "Software Performance Engineering in the DevOps World".
The seminar addressed the problem of performance-aware DevOps. Both, DevOps and performance engineering have been growing trends over the past one to two years, in no small part due to the rise in importance of identifying performance anomalies in the operations (Ops) of cloud and big data systems and feeding these back to the development (Dev). However, so far, the research community has treated software engineering, performance engineering, and cloud computing mostly as individual research areas. We aimed to identify cross-community collaboration, and to set the path for long-lasting collaborations towards performance-aware DevOps.
The main goal of the seminar was to bring together young researchers (PhD students in a later stage of their PhD, as well as PostDocs or Junior Professors) in the areas of (i) software engineering, (ii) performance engineering, and (iii) cloud computing and big data to present their current research projects, to exchange experience and expertise, to discuss research challenges, and to develop ideas for future collaborations.
△ Less
Submitted 26 September, 2017;
originally announced September 2017.
-
Superconductivity in SrB3C3 clathrate
Authors:
Li Zhu,
Hanyu Liu,
Maddury Somayazulu,
Yue Meng,
Piotr A. Guńka,
Thomas B. Shiell,
Curtis Kenney-Benson,
Stella Chariton,
Vitali B. Prakapenka,
Hyeok Yoon,
Jarryd A. Horn,
Johnpierre Paglione,
Roald Hoffmann,
R. E. Cohen,
Timothy A. Strobel
Abstract:
We predict superconductivity for the carbon-boron clathrate SrB3C3 at 27-43 K for Coulomb pseudopotential (mu*) values between 0.17 and 0.10 using first-principles calculations with conventional electron-phonon coupling. Electrical transport measurements, facilitated by a novel in situ experimental design compatible with extreme synthesis conditions (>3000 K at 50 GPa), show non-hysteretic resisti…
▽ More
We predict superconductivity for the carbon-boron clathrate SrB3C3 at 27-43 K for Coulomb pseudopotential (mu*) values between 0.17 and 0.10 using first-principles calculations with conventional electron-phonon coupling. Electrical transport measurements, facilitated by a novel in situ experimental design compatible with extreme synthesis conditions (>3000 K at 50 GPa), show non-hysteretic resistivity drops that track the calculated magnitude and pressure dependence of superconductivity for mu*=0.15, and transport measurements collected under applied magnetic fields confirm superconductivity with an onset Tc of approximately 20 K at 40 GPa. Carbon-based clathrates thus represent a new class of superconductors similar to other covalent metals like MgB2 and doped fullerenes. Carbon clathrates share structures similar to superconducting superhydrides, but covalent C-B bonds allow metastable persistence at ambient conditions.
△ Less
Submitted 15 November, 2021; v1 submitted 11 August, 2017;
originally announced August 2017.
-
Delta-net: Real-time Network Verification Using Atoms
Authors:
Alex Horn,
Ali Kheradmand,
Mukul R. Prasad
Abstract:
Real-time network verification promises to automatically detect violations of network-wide reachability invariants on the data plane. To be useful in practice, these violations need to be detected in the order of milliseconds, without raising false alarms. To date, most real-time data plane checkers address this problem by exploiting at least one of the following two observations: (i) only small p…
▽ More
Real-time network verification promises to automatically detect violations of network-wide reachability invariants on the data plane. To be useful in practice, these violations need to be detected in the order of milliseconds, without raising false alarms. To date, most real-time data plane checkers address this problem by exploiting at least one of the following two observations: (i) only small parts of the network tend to be affected by typical changes to the data plane, and (ii) many different packets tend to share the same forwarding behaviour in the entire network. This paper shows how to effectively exploit a third characteristic of the problem, namely: similarity among forwarding behaviour of packets through parts of the network, rather than its entirety. We propose the first provably amortized quasi-linear algorithm to do so. We implement our algorithm in a new real-time data plane checker, Delta-net. Our experiments with SDN-IP, a globally deployed ONOS software-defined networking application, and several hundred million IP prefix rules generated using topologies and BGP updates from real-world deployed networks, show that Delta-net checks a rule insertion or removal in approximately 40 microseconds on average, a more than 10X improvement over the state-of-the-art. We also show that Delta-net eliminates an inherent bottleneck in the state-of-the-art that restricts its use in answering Datalog-style "what if" queries.
△ Less
Submitted 23 February, 2017;
originally announced February 2017.
-
Specht's criterion for systems of linear mappings
Authors:
Vyacheslav Futorny,
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
W.Specht (1940) proved that two $n\times n$ complex matrices $A$ and $B$ are unitarily similar if and only if $\operatorname{trace} w(A,A^{\ast}) = \operatorname{trace} w(B,B^{\ast})$ for every word $w(x,y)$ in two noncommuting variables. We extend his criterion and its generalizations by N.A.Wiegmann (1961) and N.Jing (2015) to an arbitrary system $\mathcal A$ consisting of complex or real inner…
▽ More
W.Specht (1940) proved that two $n\times n$ complex matrices $A$ and $B$ are unitarily similar if and only if $\operatorname{trace} w(A,A^{\ast}) = \operatorname{trace} w(B,B^{\ast})$ for every word $w(x,y)$ in two noncommuting variables. We extend his criterion and its generalizations by N.A.Wiegmann (1961) and N.Jing (2015) to an arbitrary system $\mathcal A$ consisting of complex or real inner product spaces and linear mappings among them. We represent such a system by the directed graph $Q(\mathcal A)$, whose vertices are inner product spaces and arrows are linear mappings. Denote by $\widetilde Q(\mathcal A)$ the directed graph obtained by enlarging to $Q(\mathcal A)$ the adjoint linear mappings. We prove that a system $\mathcal A$ is transformed by isometries of its spaces to a system $\mathcal B$ if and only if the traces of all closed directed walks in $\widetilde Q(\mathcal A)$ and $\widetilde Q(\mathcal B)$ coincide.
△ Less
Submitted 30 January, 2017;
originally announced January 2017.
-
Performance-oriented DevOps: A Research Agenda
Authors:
Andreas Brunnert,
Andre van Hoorn,
Felix Willnecker,
Alexandru Danciu,
Wilhelm Hasselbring,
Christoph Heger,
Nikolas Herbst,
Pooyan Jamshidi,
Reiner Jung,
Joakim von Kistowski,
Anne Koziolek,
Johannes Kroß,
Simon Spinner,
Christian Vögele,
Jürgen Walter,
Alexander Wert
Abstract:
DevOps is a trend towards a tighter integration between development (Dev) and operations (Ops) teams. The need for such an integration is driven by the requirement to continuously adapt enterprise applications (EAs) to changes in the business environment. As of today, DevOps concepts have been primarily introduced to ensure a constant flow of features and bug fixes into new releases from a functio…
▽ More
DevOps is a trend towards a tighter integration between development (Dev) and operations (Ops) teams. The need for such an integration is driven by the requirement to continuously adapt enterprise applications (EAs) to changes in the business environment. As of today, DevOps concepts have been primarily introduced to ensure a constant flow of features and bug fixes into new releases from a functional perspective. In order to integrate a non-functional perspective into these DevOps concepts this report focuses on tools, activities, and processes to ensure one of the most important quality attributes of a software system, namely performance.
Performance describes system properties concerning its timeliness and use of resources. Common metrics are response time, throughput, and resource utilization. Performance goals for EAs are typically defined by setting upper and/or lower bounds for these metrics and specific business transactions. In order to ensure that such performance goals can be met, several activities are required during development and operation of these systems as well as during the transition from Dev to Ops. Activities during development are typically summarized by the term Software Performance Engineering (SPE), whereas activities during operations are called Application Performance Management (APM). SPE and APM were historically tackled independently from each other, but the newly emerging DevOps concepts require and enable a tighter integration between both activity streams. This report presents existing solutions to support this integration as well as open research challenges in this area.
△ Less
Submitted 18 August, 2015;
originally announced August 2015.
-
A Concurrency Problem with Exponential DPLL(T) Proofs
Authors:
Liana Hadarean,
Alex Horn,
Tim King
Abstract:
Many satisfiability modulo theories solvers implement a variant of the DPLL(T ) framework which separates theory-specific reasoning from reasoning on the propositional abstraction of the formula. Such solvers conclude that a formula is unsatisfiable once they have learned enough theory conflicts to derive a propositional contradiction. However some problems, such as the diamonds problem, require l…
▽ More
Many satisfiability modulo theories solvers implement a variant of the DPLL(T ) framework which separates theory-specific reasoning from reasoning on the propositional abstraction of the formula. Such solvers conclude that a formula is unsatisfiable once they have learned enough theory conflicts to derive a propositional contradiction. However some problems, such as the diamonds problem, require learning exponentially many conflicts. We give a general criterion for establishing lower bounds on the number of theory conflicts in any DPLL(T ) proof for a given problem. We apply our criterion to two different state-of-the-art symbolic partial-order encodings of a simple, yet representative concurrency problem. Even though one of the encodings is asymptotically smaller than the other, we establish the same exponential lower bound proof complexity for both. Our experiments confirm this theoretical lower bound across multiple solvers and theory combinations.
△ Less
Submitted 4 June, 2015;
originally announced June 2015.
-
Faster linearizability checking via $P$-compositionality
Authors:
Alex Horn,
Daniel Kroening
Abstract:
Linearizability is a well-established consistency and correctness criterion for concurrent data types. An important feature of linearizability is Herlihy and Wing's locality principle, which says that a concurrent system is linearizable if and only if all of its constituent parts (so-called objects) are linearizable. This paper presents $P$-compositionality, which generalizes the idea behind the l…
▽ More
Linearizability is a well-established consistency and correctness criterion for concurrent data types. An important feature of linearizability is Herlihy and Wing's locality principle, which says that a concurrent system is linearizable if and only if all of its constituent parts (so-called objects) are linearizable. This paper presents $P$-compositionality, which generalizes the idea behind the locality principle to operations on the same concurrent data type. We implement $P$-compositionality in a novel linearizability checker. Our experiments with over nine implementations of concurrent sets, including Intel's TBB library, show that our linearizability checker is one order of magnitude faster and/or more space efficient than the state-of-the-art algorithm.
△ Less
Submitted 1 April, 2015;
originally announced April 2015.
-
On partial order semantics for SAT/SMT-based symbolic encodings of weak memory concurrency
Authors:
Alex Horn,
Daniel Kroening
Abstract:
Concurrent systems are notoriously difficult to analyze, and technological advances such as weak memory architectures greatly compound this problem. This has renewed interest in partial order semantics as a theoretical foundation for formal verification techniques. Among these, symbolic techniques have been shown to be particularly effective at finding concurrency-related bugs because they can lev…
▽ More
Concurrent systems are notoriously difficult to analyze, and technological advances such as weak memory architectures greatly compound this problem. This has renewed interest in partial order semantics as a theoretical foundation for formal verification techniques. Among these, symbolic techniques have been shown to be particularly effective at finding concurrency-related bugs because they can leverage highly optimized decision procedures such as SAT/SMT solvers. This paper gives new fundamental results on partial order semantics for SAT/SMT-based symbolic encodings of weak memory concurrency. In particular, we give the theoretical basis for a decision procedure that can handle a fragment of concurrent programs endowed with least fixed point operators. In addition, we show that a certain partial order semantics of relaxed sequential consistency is equivalent to the conjunction of three extensively studied weak memory axioms by Alglave et al. An important consequence of this equivalence is an asymptotically smaller symbolic encoding for bounded model checking which has only a quadratic number of partial order constraints compared to the state-of-the-art cubic-size encoding.
△ Less
Submitted 31 March, 2015;
originally announced April 2015.
-
Concurrent Kleene Algebra of Partial Strings
Authors:
Alex Horn,
Jade Alglave
Abstract:
Concurrent Kleene Algebra (CKA) is a recently proposed algebraic structure by Hoare and collaborators that unifies the laws of concurrent programming. The unifying power of CKA rests largely on the so-called exchange law that describes how concurrent and sequential composition operators can be interchanged. Based on extensive theoretical work on true concurrency in the past, this paper extends Gis…
▽ More
Concurrent Kleene Algebra (CKA) is a recently proposed algebraic structure by Hoare and collaborators that unifies the laws of concurrent programming. The unifying power of CKA rests largely on the so-called exchange law that describes how concurrent and sequential composition operators can be interchanged. Based on extensive theoretical work on true concurrency in the past, this paper extends Gischer's pomset model with least fixed point operators and formalizes the program refinement relation by Ésik's monotonic bijective morphisms to construct a partial order model of CKA. The existence of such a model is relevant when we want to prove and disprove properties about concurrent programs with loops. In particular, it gives a foundation for the analysis of programs that concurrently access relaxed memory as shown in subsequent work.
△ Less
Submitted 17 October, 2014; v1 submitted 1 July, 2014;
originally announced July 2014.
-
Representations of quivers and mixed graphs
Authors:
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
This is a survey article for "Handbook of Linear Algebra", 2nd ed., Chapman & Hall/CRC, 2014. An informal introduction to representations of quivers and finite dimensional algebras from a linear algebraist's point of view is given. The notion of quiver representations is extended to representations of mixed graphs, which permits one to study systems of linear mappings and bilinear or sesquilinear…
▽ More
This is a survey article for "Handbook of Linear Algebra", 2nd ed., Chapman & Hall/CRC, 2014. An informal introduction to representations of quivers and finite dimensional algebras from a linear algebraist's point of view is given. The notion of quiver representations is extended to representations of mixed graphs, which permits one to study systems of linear mappings and bilinear or sesquilinear forms. The problem of classifying such systems is reduced to the problem of classifying systems of linear mappings.
△ Less
Submitted 30 December, 2013;
originally announced December 2013.
-
Simultaneous unitary equivalences
Authors:
Tatiana G. Gerasimova,
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
Let A, B, C, D be given finite sets of pairs of n-by-n complex matrices. We describe an algorithm to determine, with finitely many computations, whether there is a single unitary matrix U such that each pair of matrices in A is unitarily similar via U, each pair of matrices in B is unitarily congruent via U, each pair of matrices in C is unitarily similar via \bar{U}, and each pair of matrices in…
▽ More
Let A, B, C, D be given finite sets of pairs of n-by-n complex matrices. We describe an algorithm to determine, with finitely many computations, whether there is a single unitary matrix U such that each pair of matrices in A is unitarily similar via U, each pair of matrices in B is unitarily congruent via U, each pair of matrices in C is unitarily similar via \bar{U}, and each pair of matrices in D is unitarily congruent via \bar{U}.
△ Less
Submitted 19 December, 2011;
originally announced December 2011.
-
A canonical form for nonderogatory matrices under unitary similarity
Authors:
Vyacheslav Futorny,
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
A square matrix is nonderogatory if its Jordan blocks have distinct eigenvalues. We give canonical forms (i) for nonderogatory complex matrices up to unitary similarity and (ii) for pairs of complex matrices up to similarity, in which one matrix has distinct eigenvalues. The types of these canonical forms are given by undirected and, respectively, directed graphs with no undirected cycles.
A square matrix is nonderogatory if its Jordan blocks have distinct eigenvalues. We give canonical forms (i) for nonderogatory complex matrices up to unitary similarity and (ii) for pairs of complex matrices up to similarity, in which one matrix has distinct eigenvalues. The types of these canonical forms are given by undirected and, respectively, directed graphs with no undirected cycles.
△ Less
Submitted 15 December, 2011;
originally announced December 2011.
-
Remarks on the classification of a pair of commuting semilinear operators
Authors:
Debora Duarte de Oliveira,
Roger A. Horn,
Tatiana Klimchuk,
Vladimir V. Sergeichuk
Abstract:
Gelfand and Ponomarev [Functional Anal. Appl. 3 (1969) 325-326] proved that the problem of classifying pairs of commuting linear operators contains the problem of classifying k-tuples of linear operators for any k. We prove an analogous statement for semilinear operators.
Gelfand and Ponomarev [Functional Anal. Appl. 3 (1969) 325-326] proved that the problem of classifying pairs of commuting linear operators contains the problem of classifying k-tuples of linear operators for any k. We prove an analogous statement for semilinear operators.
△ Less
Submitted 18 October, 2011;
originally announced October 2011.
-
Matrices that are self-congruent only via matrices of determinant one
Authors:
Tatyana G. Gerasimova,
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
Docovic and Szechtman, [Proc. Amer. Math. Soc. 133 (2005) 2853-2863] considered a vector space V endowed with a bilinear form. They proved that all isometries of V over a field F of characteristic not 2 have determinant 1 if and only if V has no orthogonal summands of odd dimension (the case of characteristic 2 was also considered). Their proof is based on Riehm's classification of bilinear forms.…
▽ More
Docovic and Szechtman, [Proc. Amer. Math. Soc. 133 (2005) 2853-2863] considered a vector space V endowed with a bilinear form. They proved that all isometries of V over a field F of characteristic not 2 have determinant 1 if and only if V has no orthogonal summands of odd dimension (the case of characteristic 2 was also considered). Their proof is based on Riehm's classification of bilinear forms. Coakley, Dopico, and Johnson [Linear Algebra Appl. 428 (2008) 796-813] gave another proof of this criterion over the fields of real and complex numbers using Thompson's canonical pairs of symmetric and skew-symmetric matrices for congruence. Let M be the matrix of the bilinear form on V. We give another proof of this criterion over F using our canonical matrices for congruence and obtain necessary and sufficient conditions involving canonical forms of M for congruence, of (M^T,M) for equivalence, and of M^{-T}M (if M is nonsingular) for similarity.
△ Less
Submitted 20 April, 2010;
originally announced April 2010.
-
Canonical Forms for Unitary Congruence and *Congruence
Authors:
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
We use methods of the general theory of congruence and *congruence for complex matrices--regularization and cosquares-to determine a unitary congruence canonical form (respectively, a unitary *congruence canonical form) for complex matrices A such that \bar{A}A (respectively, A^2) is normal.
As special cases of our canonical forms, we obtain-in a coherent and systematic way-known canonical for…
▽ More
We use methods of the general theory of congruence and *congruence for complex matrices--regularization and cosquares-to determine a unitary congruence canonical form (respectively, a unitary *congruence canonical form) for complex matrices A such that \bar{A}A (respectively, A^2) is normal.
As special cases of our canonical forms, we obtain-in a coherent and systematic way-known canonical forms for conjugate normal, congruence normal, coninvolutory, involutory, projection, and unitary matrices. But we also obtain canonical forms for matrices whose squares are Hermitian or normal, and other cases that do not seem to have been investigated previously.
We show that the classification problems under (a) unitary *congruence when A^3 is normal, and (b) unitary congruence when A\bar{A}A is normal, are both unitarily wild, so there is no reasonable hope that a simple solution to them can be found.
△ Less
Submitted 8 October, 2007;
originally announced October 2007.
-
Classification of squared normal operators on unitary and Euclidean spaces
Authors:
Vyacheslav Futorny,
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
We give a canonical form for a complex matrix, whose square is normal, under transformations of unitary similarity as well as a canonical form for a real matrix, whose square is normal, under transformations of orthogonal similarity.
We give a canonical form for a complex matrix, whose square is normal, under transformations of unitary similarity as well as a canonical form for a real matrix, whose square is normal, under transformations of orthogonal similarity.
△ Less
Submitted 4 October, 2007;
originally announced October 2007.
-
A regularization algorithm for matrices of bilinear and sesquilinear forms
Authors:
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
We give an algorithm that uses only unitary transformations and for each square complex matrix constructs a *congruent matrix that is a direct sum of a nonsingular matrix and singular Jordan blocks.
We give an algorithm that uses only unitary transformations and for each square complex matrix constructs a *congruent matrix that is a direct sum of a nonsingular matrix and singular Jordan blocks.
△ Less
Submitted 3 October, 2007;
originally announced October 2007.
-
Tridiagonal canonical matrices of bilinear or sesquilinear forms and of pairs of symmetric, skew-symmetric, or Hermitian forms
Authors:
Vyacheslav Futorny,
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
Tridiagonal canonical forms of square matrices under congruence or *congruence, pairs of symmetric or skew-symmetric matrices under congruence, and pairs of Hermitian matrices under *congruence are given over an algebraically closed field of characteristic different from 2.
Tridiagonal canonical forms of square matrices under congruence or *congruence, pairs of symmetric or skew-symmetric matrices under congruence, and pairs of Hermitian matrices under *congruence are given over an algebraically closed field of characteristic different from 2.
△ Less
Submitted 3 October, 2007;
originally announced October 2007.
-
Congruences of a square matrix and its transpose
Authors:
Roger A. Horn,
Vladimir V. Sergeichuk
Abstract:
It is known that any square matrix over any field F is congruent to its transpose. We show that they are also *congruent with respect to any nonidentity involution on F.
It is known that any square matrix over any field F is congruent to its transpose. We show that they are also *congruent with respect to any nonidentity involution on F.
△ Less
Submitted 16 September, 2007;
originally announced September 2007.