Skip to main content

Showing 1–32 of 32 results for author: Kung, J

.
  1. arXiv:2505.06504  [pdf, other

    cs.AR

    FlexNeRFer: A Multi-Dataflow, Adaptive Sparsity-Aware Accelerator for On-Device NeRF Rendering

    Authors: Seock-Hwan Noh, Banseok Shin, Jeik Choi, Seungpyo Lee, Jaeha Kung, Yeseong Kim

    Abstract: Neural Radiance Fields (NeRF), an AI-driven approach for 3D view reconstruction, has demonstrated impressive performance, sparking active research across fields. As a result, a range of advanced NeRF models has emerged, leading on-device applications to increasingly adopt NeRF for highly realistic scene reconstructions. With the advent of diverse NeRF models, NeRF-based applications leverage a var… ▽ More

    Submitted 10 May, 2025; originally announced May 2025.

    Comments: Accepted for publication at the 52nd IEEE/ACM International Symposium on Computer Architecture (ISCA-52), 2025

  2. arXiv:2411.10152  [pdf, ps, other

    cs.LG cs.AI

    Causal Time-Series Synchronization for Multi-Dimensional Forecasting

    Authors: Michael Mayr, Georgios C. Chasparis, Josef Küng

    Abstract: The process industry's high expectations for Digital Twins require modeling approaches that can generalize across tasks and diverse domains with potentially different data dimensions and distributional shifts i.e., Foundational Models. Despite success in natural language processing and computer vision, transfer learning with (self-) supervised signals for pre-training general-purpose models is lar… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

    Comments: 14 pages

  3. arXiv:2409.05902  [pdf, ps, other

    cs.LG cs.AR cs.CL

    OPAL: Outlier-Preserved Microscaling Quantization Accelerator for Generative Large Language Models

    Authors: Jahyun Koo, Dahoon Park, Sangwoo Jung, Jaeha Kung

    Abstract: To overcome the burden on the memory size and bandwidth due to ever-increasing size of large language models (LLMs), aggressive weight quantization has been recently studied, while lacking research on quantizing activations. In this paper, we present a hardware-software co-design method that results in an energy-efficient LLM accelerator, named OPAL, for generation tasks. First of all, a novel act… ▽ More

    Submitted 24 September, 2024; v1 submitted 5 September, 2024; originally announced September 2024.

    Comments: 7 pages, 8 figures, DAC2024 accepted

  4. arXiv:2407.02275  [pdf, other

    cs.LG cs.AI

    Learning Paradigms and Modelling Methodologies for Digital Twins in Process Industry

    Authors: Michael Mayr, Georgios C. Chasparis, Josef Küng

    Abstract: Central to the digital transformation of the process industry are Digital Twins (DTs), virtual replicas of physical manufacturing systems that combine sensor data with sophisticated data-based or physics-based models, or a combination thereof, to tackle a variety of industrial-relevant tasks like process monitoring, predictive control or decision support. The backbone of a DT, i.e. the concrete mo… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  5. arXiv:2405.20762  [pdf

    cs.CR

    Comparison of Access Control Approaches for Graph-Structured Data

    Authors: Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Kueng

    Abstract: Access control is the enforcement of the authorization policy, which defines subjects, resources, and access rights. Graph-structured data requires advanced, flexible, and fine-grained access control due to its complex structure as sequences of alternating vertices and edges. Several research works focus on protecting property graph-structured data, enforcing fine-grained access control, and provi… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

    Comments: Extended version of an accepted paper at the 21st International Conference on Security and Cryptography (SECRYPT), 2024

  6. arXiv:2403.08786  [pdf, ps, other

    cs.NE cs.AI

    One-Spike SNN: Single-Spike Phase Coding with Base Manipulation for ANN-to-SNN Conversion Loss Minimization

    Authors: Sangwoo Hwang, Jaeha Kung

    Abstract: As spiking neural networks (SNNs) are event-driven, energy efficiency is higher than conventional artificial neural networks (ANNs). Since SNN delivers data through discrete spikes, it is difficult to use gradient methods for training, limiting its accuracy. To keep the accuracy of SNNs similar to ANN counterparts, pre-trained ANNs are converted to SNNs (ANN-to-SNN conversion). During the conversi… ▽ More

    Submitted 29 January, 2024; originally announced March 2024.

    Comments: 11 pages, 10 figures

    MSC Class: 68T07

  7. arXiv:2310.16757  [pdf, other

    cs.AR

    All-rounder: A Flexible AI Accelerator with Diverse Data Format Support and Morphable Structure for Multi-DNN Processing

    Authors: Seock-Hwan Noh, Seungpyo Lee, Banseok Shin, Sehun Park, Yongjoo Jang, Jaeha Kung

    Abstract: Recognizing the explosive increase in the use of AI-based applications, several industrial companies developed custom ASICs (e.g., Google TPU, IBM RaPiD, Intel NNP-I/NNP-T) and constructed a hyperscale cloud infrastructure with them. These ASICs perform operations of the inference or training process of AI models which are requested by users. Since the AI models have different data formats and typ… ▽ More

    Submitted 28 February, 2025; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: A paper accepted in the 2025 IEEE Transactions on Very Large Scale Integration (VLSI) Systems

  8. arXiv:2306.12819  [pdf

    cs.CR

    XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement

    Authors: Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng

    Abstract: The increasing use of graph-structured data for business- and privacy-critical applications requires sophisticated, flexible and fine-grained authorization and access control. Currently, role-based access control is supported in graph databases, where access to objects is restricted via roles. This does not take special properties of graphs into account such as vertices and edges along the path be… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

    Comments: Extended version of an accepted paper at the 20th International Conference on Security and Cryptography (SECRYPT), 2023

  9. arXiv:2305.09446  [pdf, other

    cs.LG stat.ML

    A Probabilistic Transformation of Distance-Based Outliers

    Authors: David Muhr, Michael Affenzeller, Josef Küng

    Abstract: The scores of distance-based outlier detection methods are difficult to interpret, making it challenging to determine a cut-off threshold between normal and outlier data points without additional context. We describe a generic transformation of distance-based outlier scores into interpretable, probabilistic estimates. The transformation is ranking-stable and increases the contrast between normal a… ▽ More

    Submitted 18 July, 2023; v1 submitted 16 May, 2023; originally announced May 2023.

    MSC Class: 62R07; 62R20 ACM Class: I.5.1; I.5.2

  10. arXiv:2211.02686  [pdf, ps, other

    cs.AR cs.LG

    LightNorm: Area and Energy-Efficient Batch Normalization Hardware for On-Device DNN Training

    Authors: Seock-Hwan Noh, Junsang Park, Dahoon Park, Jahyun Koo, Jeik Choi, Jaeha Kung

    Abstract: When training early-stage deep neural networks (DNNs), generating intermediate features via convolution or linear layers occupied most of the execution time. Accordingly, extensive research has been done to reduce the computational burden of the convolution or linear layers. In recent mobile-friendly DNNs, however, the relative number of operations involved in processing these layers has significa… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: The paper is going to appearin the 40th IEEE International Conference on Computer Design (ICCD), 2022

  11. arXiv:2203.06673  [pdf, ps, other

    cs.LG cs.AI cs.AR

    FlexBlock: A Flexible DNN Training Accelerator with Multi-Mode Block Floating Point Support

    Authors: Seock-Hwan Noh, Jahyun Koo, Seunghyun Lee, Jongse Park, Jaeha Kung

    Abstract: Training deep neural networks (DNNs) is a computationally expensive job, which can take weeks or months even with high performance GPUs. As a remedy for this challenge, community has started exploring the use of more efficient data representations in the training process, e.g., block floating point (BFP). However, prior work on BFP-based DNN accelerators rely on a specific BFP representation makin… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  12. arXiv:2111.01080  [pdf, other

    cs.LG cs.CR

    ZeBRA: Precisely Destroying Neural Networks with Zero-Data Based Repeated Bit Flip Attack

    Authors: Dahoon Park, Kon-Woo Kwon, Sunghoon Im, Jaeha Kung

    Abstract: In this paper, we present Zero-data Based Repeated bit flip Attack (ZeBRA) that precisely destroys deep neural networks (DNNs) by synthesizing its own attack datasets. Many prior works on adversarial weight attack require not only the weight parameters, but also the training or test dataset in searching vulnerable bits to be attacked. We propose to synthesize the attack dataset, named distilled ta… ▽ More

    Submitted 18 November, 2021; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: 14 pages, 3 figures, 5 tables, Accepted at British Machine Vision Conference (BMVC) 2021

  13. Inconsequential results on the Merino-Welsh conjecture for Tutte polynomials

    Authors: Joseph P. S. Kung

    Abstract: The Merino-Welsh conjectures say that subject to conditions, there is an inequality among the Tutte-polynomial evaluations $T(M;2,0)$, $T(M;0,2)$, and $T(M;1,1)$. We present three results on a Merino-Welsh conjecture. These results are "inconsequential" in the sense that although they imply a version of the conjecture for many matroids, they seem to be dead ends.

    Submitted 19 May, 2021; v1 submitted 4 May, 2021; originally announced May 2021.

    MSC Class: 05B35

    Journal ref: Advances in Applied Mathematics (2025)

  14. arXiv:2104.04018  [pdf, ps, other

    math.CO

    The $\barγ$-frame for Tutte polynomials of matroids

    Authors: Joseph P. S. Kung

    Abstract: Specializing the $γ$-basis for the vector space $\mathcal{G}(n,r)$ spanned by the set of symbols on bit sequences with $r$ $1$'s and $n-r$ $0$'s, we obtain a frame or spanning set for the vector space $\mathcal{T}(n,r)$ spanned by Tutte polynomials of matroids having rank $r$ and size $n$. Every Tutte polynomial can be expanded as a linear combination with non-negative integer coefficients of elem… ▽ More

    Submitted 5 June, 2021; v1 submitted 8 April, 2021; originally announced April 2021.

    MSC Class: 05B35

  15. A NoSQL Data-based Personalized Recommendation System for C2C e-Commerce

    Authors: Khanh Dang, Khuong Vo, Josef Küng

    Abstract: With the considerable development of customer-to-customer (C2C) e-commerce in the recent years, there is a big demand for an effective recommendation system that suggests suitable websites for users to sell their items with some specified needs. Nonetheless, e-commerce recommendation systems are mostly designed for business-to-customer (B2C) websites, where the systems offer the consumers the prod… ▽ More

    Submitted 26 June, 2018; originally announced June 2018.

    Comments: Accepted to DEXA 2017

  16. arXiv:1711.08816  [pdf, ps, other

    math.CO

    Algebra and valuations related to the Tutte polynomial

    Authors: Michael J. Falk, Joseph P. S. Kung

    Abstract: This is a chapter destined for the book "Handbook of the Tutte Polynomial". The chapter is a composite. The first part is a brief introduction to Orlik-Solomon algebras. The second part sketches the theory of evaluative functions on matroid base polytopes and in particular, the G-invariant (as the subject is known late 2015). A third very short section is on Hopf-algebra or coalgebra structures in… ▽ More

    Submitted 23 November, 2017; originally announced November 2017.

    MSC Class: 05B35

  17. The $\mathcal{G}$-invariant and catenary data of a matroid

    Authors: Joseph E. Bonin, Joseph P. S. Kung

    Abstract: The catenary data of a matroid $M$ of rank $r$ on $n$ elements is the vector $(ν(M;a_0,a_1,\ldots,a_r))$, indexed by compositions $(a_0,a_1,\ldots,a_r)$, where $a_0 \geq 0$,\, $a_i > 0$ for $i \geq 1$, and $a_0+ a_1 + \cdots + a_r = n$, with the coordinate $ν(M;a_0,a_1, \ldots,a_r)$ equal to the number of maximal chains or flags $(X_0,X_1, \ldots,X_r)$ of flats or closed sets such that $X_i$ has r… ▽ More

    Submitted 11 February, 2025; v1 submitted 2 October, 2015; originally announced October 2015.

    Comments: 25 pages. The latest version (submitted January 29, 2025) contains an erratum (Section 9). An error in the formula for the G-invariant of the truncation (in Proposition 4.2) is corrected

    MSC Class: 52B40; 05B35

    Journal ref: Advances in Applied Mathematics, 2018

  18. arXiv:1509.02117  [pdf, ps, other

    math.CO

    Syzygies on Tutte polynomials of freedom matroids

    Authors: Joseph Kung

    Abstract: We give a generating set for linear relations on Tutte polynomials of rank-$r$ size-$n$ freedom matroids.

    Submitted 6 September, 2016; v1 submitted 7 September, 2015; originally announced September 2015.

    MSC Class: 05B35 52B40

  19. arXiv:1304.2448  [pdf, other

    math.CO

    Maximum size binary matroids with no AG(3,2)-minor are graphic

    Authors: Joseph P. S. Kung, Dillon Mayhew, Irene Pivotto, Gordon F. Royle

    Abstract: We prove that the maximum size of a simple binary matroid of rank $r \geq 5$ with no AG(3,2)-minor is $\binom{r+1}{2}$ and characterise those matroids achieving this bound. When $r \geq 6$, the graphic matroid $M(K_{r+1})$ is the unique matroid meeting the bound, but there are a handful of smaller examples. In addition, we determine the size function for non-regular simple binary matroids with no… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    MSC Class: 05B35

  20. Semidirect sums of matroids

    Authors: Joseph E. Bonin, Joseph P. S. Kung

    Abstract: For matroids M and N on disjoint sets S and T, a semidirect sum of M and N is a matroid K on the union of S and T that, like the direct sum and the free product, has the restriction of K to S equal to M and the contraction of K to T equal to N. We abstract a matrix construction to get a general matroid construction: the matroid union of any rank-preserving extension of M on the union of S and T wi… ▽ More

    Submitted 1 October, 2012; originally announced October 2012.

    Comments: 18 pages, 2 figures

    MSC Class: 05B35; 05B20; 05C35; 05D99; 06C10; 51M04

    Journal ref: Annals of Combinatorics, 2015

  21. arXiv:1109.1806  [pdf, ps, other

    math.CO

    Rook and queen paths with boundaries

    Authors: Joseph P. S. Kung, Anna de Mier

    Abstract: A rook path is a path on lattice points in the plane in which any proper horizontal step to the right or vertical step north is allowed. If, in addition, one allow bishop steps, that is, proper diagonal steps of slope 1, then one has queen paths. A rook or queen path is Catalan if it starts at the origin and stays strictly to the left of the line y = x-1. We give explicit formulas for the ordinary… ▽ More

    Submitted 3 July, 2012; v1 submitted 8 September, 2011; originally announced September 2011.

    MSC Class: 05A15

  22. Characterizations of transversal and fundamental transversal matroids

    Authors: Joseph E. Bonin, Joseph P. S. Kung, Anna de Mier

    Abstract: A result of Mason, as refined by Ingleton, characterizes transversal matroids as the matroids that satisfy a set of inequalities that relate the ranks of intersections and unions of nonempty sets of cyclic flats. We prove counterparts, for fundamental transversal matroids, of this and other characterizations of transversal matroids. In particular, we show that fundamental transversal matroids are… ▽ More

    Submitted 17 September, 2010; originally announced September 2010.

    Comments: 12 pages, 1 figure

    MSC Class: 05B35

    Journal ref: The Electronic Journal of Combinatorics, 2011

  23. arXiv:1007.0279  [pdf, ps, other

    math.CO

    Congruence conditions, parcels, and Tutte polynomials of graphs and matroids

    Authors: Joseph P. S. Kung

    Abstract: Let $G$ be a matrix and $M(G)$ be the matroid defined by linear dependence on the set $E$ of column vectors of $G.$ Roughly speaking, a parcel is a subset of pairs $(f,g)$ of functions defined on $E$ to an Abelian group $A$ satisfying a coboundary condition (that $f-g$ is a flow over $A$ relative to $G$) and a congruence condition (that the size of the supports of $f$ and $g$ satisfy some congruen… ▽ More

    Submitted 3 December, 2011; v1 submitted 1 July, 2010; originally announced July 2010.

    MSC Class: 05B35

  24. arXiv:1001.3973   

    cond-mat.mtrl-sci cond-mat.str-el

    Photo-induced high-temperature order-disorder phase transition in CaSnO3 perovskite revealed by Raman spectroscopy

    Authors: C. -J. Chen, J. Kung, C. -M. Lin, M. Zhang, S. A. T. Redfern

    Abstract: Calcium stannate perovskite (CaSnO3) has been studied by Raman spectroscopy at two excitation wavelengths (514.5 nm and 632.8 nm). A new first-order order-disorder phase transition induces Raman frequency shifts and line width doubling at 121C on heating (94C on cooling), seen in experiments using the 514.5 nm line of an Ar+-ion laser. The transition is also seen when using a 623.8 nm He-Ne lase… ▽ More

    Submitted 6 July, 2012; v1 submitted 22 January, 2010; originally announced January 2010.

    Comments: Data questionable after several repeat experiments

  25. arXiv:0909.2264  [pdf, ps, other

    math.CO

    Convolution-multiplication identities for Tutte polynomials of matroids

    Authors: Joseph P. S. Kung

    Abstract: We give a general multiplication-convolution identity for the multivariate and bivariate rank generating polynomial of a matroid. The bivariate rank generating polynomial is transformable to and from the Tutte polynomial by simple algebraic operations. Several identities, almost all already known in some form, are specializations of this identity. Combinatorial or probabilistic interpretations a… ▽ More

    Submitted 11 September, 2009; originally announced September 2009.

    Comments: 9 pages

    MSC Class: 05B35; 05C15; 05C80

  26. arXiv:0908.0181  [pdf, ps, other

    math.CO

    Graphs whose flow polynomials have only integral roots

    Authors: Joseph P. S. Kung, Gordon F. Royle

    Abstract: We show if the flow polynomial of a bridgeless graph G has only integral roots, then G is the dual graph to a planar chordal graph. We also show that for 3-connected cubic graphs, the same conclusion holds under the weaker hypothesis that it has only real flow roots. Expressed in the language of matroid theory, this result says that the cographic matroids with only integral characteristic roots… ▽ More

    Submitted 10 September, 2009; v1 submitted 2 August, 2009; originally announced August 2009.

    Comments: 12 pages, 1 figure

    MSC Class: 05B35

  27. arXiv:0709.1717  [pdf, ps, other

    math.CO

    Lattice and Schroder paths with periodic boundaries

    Authors: Joseph P. S. Kung, Anna de Mier, Xinyu Sun, Catherine H. Yan

    Abstract: We consider paths in the plane with $(1,0),$ $(0,1),$ and $(a,b)$-steps that start at the origin, end at height $n,$ and stay to the left of a given non-decreasing right boundary. We show that if the boundary is periodic and has slope at most $b/a,$ then the ordinary generating function for the number of such paths ending at height $n$ is algebraic. Our argument is in two parts. We use a simple… ▽ More

    Submitted 27 September, 2007; v1 submitted 11 September, 2007; originally announced September 2007.

    Comments: 22 pages, 1 figure; Revised version, references added and corrected typos

    MSC Class: 05A15; 05A10

  28. arXiv:math/0604168  [pdf, ps, other

    math.CO math.AC

    Derivation modules of orthogonal duals of hyperplane arrangements

    Authors: Joseph P. S. Kung, Hal Schenck

    Abstract: Let A be an n by d matrix having full rank n. An orthogonal dual A^{\perp} of A is a (d-n) by d matrix of rank (d-n) such that every row of A^{\perp} is orthogonal (under the usual dot product) to every row of A. We define the orthogonal dual for arrangements by identifying an essential (central) arrangement of d hyperplanes in n-dimensional space with the n by d matrix of coefficients of the ho… ▽ More

    Submitted 7 April, 2006; originally announced April 2006.

    Comments: 9 pages 2 figures

    MSC Class: 52C35 (Primary) 05B35 05C99 13D05 (Secondary)

    Journal ref: Journal of Algebraic Combinatorics, 24, (2006), 253-262

  29. Strong Energy Condition in $R + R^2$ Gravity

    Authors: J. H. Kung

    Abstract: In this paper, we study Raychaudhuri's equation in the background of $R + βR^2$ gravity with a phenomenological matter ($ρ\propto a(t)^{-n}$). We conclude that even though the Strong Energy Condition (S.E.C.) for Einstein's gravity, which guarantees singularity, is $n\geq 2$ for $ρ\propto a(t)^{-n}$, a perturbative analysis of Raychaudhuri's equation in the background of $R + βR^2$ gravity revea… ▽ More

    Submitted 4 October, 1995; originally announced October 1995.

    Comments: Submitted to Phy. Rev. D.,15 pages, 2 figures, Latex file

    Journal ref: Phys.Rev.D53:3017-3021,1996

  30. $R + R^2$ Gravity as $R +$ Backreaction

    Authors: J. H. Kung

    Abstract: Quadratic theory of gravity is a complicated constraint system. We investigate some consequences of treating quadratic terms perturbatively (higher derivative version of backreaction effects). This approach is shown to overcome some well known problems associated with higher derivative theories, i.e., the physical gravitational degree of freedom remains unchanged from those of Einstein gravity.… ▽ More

    Submitted 30 September, 1995; originally announced September 1995.

    Comments: Accepted for publication in Phy. Rev. D.,18 pages, 6 figures, Latex file

    Journal ref: Phys.Rev. D52 (1995) 6922-6928

  31. arXiv:hep-th/9302016  [pdf, ps, other

    hep-th astro-ph gr-qc

    Quantization of the Closed Mini-Superspace Models as Bound States

    Authors: Jong Hyun Kung

    Abstract: Wheeler-DeWitt equation is applied to $k > 0$ Friedmann Robertson Walker metric with various types of matter. It is shown that if the Universe ends in the matter dominated era (e.g., radiation or pressureless gas) with zero cosmological constant, then the resulting Wheeler-DeWitt equation describes a bound state problem. As solutions of a non-degenerate bound state system, the eigen-wave functio… ▽ More

    Submitted 3 February, 1993; originally announced February 1993.

    Comments: 20#

    Journal ref: Gen.Rel.Grav.27:35-53,1995

  32. Comparison of the Sachs-Wolfe Effect for Gaussian and Non-Gaussian Fluctuations

    Authors: Jong H. Kung

    Abstract: A consequence of non-Gaussian perturbations on the Sachs-Wolfe effect is studied. For a particular power spectrum, predicted Sachs-Wolfe effects are calculated for two cases: Gaussian (random phase) configuration, and a specific kind of non-Gaussian configuration. We obtain a result that the Sachs-Wolfe effect for the latter case is smaller when each temperature fluctuation is properly normalize… ▽ More

    Submitted 28 August, 1992; originally announced August 1992.

    Comments: 16 pages

    Report number: report # CfA 3435

    Journal ref: Phys.Rev.D47:409-415,1993