Skip to main content

Showing 1–11 of 11 results for author: Welch, J L

.
  1. arXiv:2502.12334  [pdf, other

    stat.ME

    Inference for Log-Gaussian Cox Point Processes using Bayesian Deep Learning: Application to Human Oral Microbiome Image Data

    Authors: Shuwan Wang, Christopher K. Wikle, Athanasios C. Micheas, Jessica L. Mark Welch, Jacqueline R. Starr, Kyu Ha Lee

    Abstract: It is common in nature to see aggregation of objects in space. Exploring the mechanism associated with the locations of such clustered observations can be essential to understanding the phenomenon, such as the source of spatial heterogeneity, or comparison to other event generating processes in the same domain. Log-Gaussian Cox processes (LGCPs) represent an important class of models for quantifyi… ▽ More

    Submitted 18 March, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

  2. arXiv:2502.10513  [pdf, other

    stat.ME

    A Bayesian Multivariate Spatial Point Pattern Model: Application to Oral Microbiome FISH Image Data

    Authors: Kyu Ha Lee, Brent A. Coull, Suman Majumder, Patrick J. La Riviere, Jessica L. Mark Welch, Jacqueline R. Starr

    Abstract: Advances in cellular imaging technologies, especially those based on fluorescence in situ hybridization (FISH) now allow detailed visualization of the spatial organization of human or bacterial cells. Quantifying this spatial organization is crucial for understanding the function of multicellular tissues or biofilms, with implications for human health and disease. To address the need for better me… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

  3. arXiv:2402.14120  [pdf, ps, other

    cs.DC

    Efficient Wait-Free Linearizable Implementations of Approximate Bounded Counters Using Read-Write Registers

    Authors: Colette Johnen, Adnane Khattabi, Alessia Milani, Jennifer L. Welch

    Abstract: Relaxing the sequential specification of a shared object is a way to obtain an implementation with better performance compared to implementing the original specification. We apply this approach to the Counter object, under the assumption that the number of times the Counter is incremented in any execution is at most a known bound $m$. We consider the $k$-multiplicative-accurate Counter object, whe… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 26 pages, to be published in SIROCCO 2024 proceedings

  4. arXiv:2308.04646  [pdf, other

    cs.DC

    Multi-Valued Connected Consensus: A New Perspective on Crusader Agreement and Adopt-Commit

    Authors: Hagit Attiya, Jennifer L. Welch

    Abstract: Algorithms to solve fault-tolerant consensus in asynchronous systems often rely on primitives such as crusader agreement, adopt-commit, and graded broadcast, which provide weaker agreement properties than consensus. Although these primitives have a similar flavor, they have been defined and implemented separately in ad hoc ways. We propose a new problem called connected consensus that has as speci… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: 38 pages, 5 figures

  5. arXiv:2202.04198  [pdf, other

    stat.AP

    Multivariate cluster point process to quantify and explore multi-entity configurations: Application to biofilm image data

    Authors: Suman Majumder, Brent A. Coull, Jessica L. Mark Welch, Patrick J. La Riviere, Floyd E. Dewhirst, Jacqueline R. Starr, Kyu Ha Lee

    Abstract: Clusters of similar or dissimilar objects are encountered in many fields. Frequently used approaches treat the central object of each cluster as latent. Yet, often objects of one or more types cluster around objects of another type. Such arrangements are common in biomedical images of cells, in which nearby cell types likely interact. Quantifying spatial relationships may elucidate biological mech… ▽ More

    Submitted 8 October, 2024; v1 submitted 8 February, 2022; originally announced February 2022.

    MSC Class: 62

  6. arXiv:2106.15554  [pdf, other

    cs.DC

    Blunting an Adversary Against Randomized Concurrent Programs with Linearizable Implementations

    Authors: Hagit Attiya, Constantin Enea, Jennifer L. Welch

    Abstract: Atomic shared objects, whose operations take place instantaneously, are a powerful abstraction for designing complex concurrent programs. Since they are not always available, they are typically substituted with software implementations. A prominent condition relating these implementations to their atomic specifications is linearizability, which preserves safety properties of the programs using the… ▽ More

    Submitted 1 March, 2022; v1 submitted 29 June, 2021; originally announced June 2021.

    Comments: 22 pages Revised version generalizes the class of implementations to which the transformation applies

  7. arXiv:2003.07787  [pdf, ps, other

    cs.DC

    Store-Collect in the Presence of Continuous Churn with Application to Snapshots and Lattice Agreement

    Authors: Hagit Attiya, Sweta Kumari, Archit Somani, Jennifer L. Welch

    Abstract: We present an algorithm for implementing a store-collect object in an asynchronous crash-prone message-passing dynamic system, where nodes continually enter and leave. The algorithm is very simple and efficient, requiring just one round trip for a store operation and two for a collect. We then show the versatility of the store-collect object for implementing churn-tolerant versions of useful data… ▽ More

    Submitted 5 November, 2020; v1 submitted 17 March, 2020; originally announced March 2020.

    Comments: 30 pages

  8. arXiv:1910.06716  [pdf, other

    cs.DC

    Byzantine-Tolerant Register in a System with Continuous Churn

    Authors: Saptaparni Kumar, Jennifer L. Welch

    Abstract: A shared read/write register emulation provides the illusion of shared-memory on top of message-passing models. The main hurdle with such emulations is dealing with server faults in the system. Several crash-tolerant register emulations in static systems require algorithms to replicate the value of the shared register onto a majority of servers. Majority correctness is necessary for such emulation… ▽ More

    Submitted 13 October, 2019; originally announced October 2019.

    Comments: arXiv admin note: text overlap with arXiv:1708.03274

  9. arXiv:1807.05139  [pdf, ps, other

    cs.DC

    A Tight Lower Bound for Clock Synchronization in Odd-Ary M-Toroids

    Authors: Reginald Frank, Jennifer L. Welch

    Abstract: Synchronizing clocks in a distributed system in which processes communicate through messages with uncertain delays is subject to inherent errors. Prior work has shown upper and lower bounds on the best synchronization achievable in a variety of network topologies and assumptions about the uncertainty on the message delays. However, until now there has not been a tight closed-form expression for th… ▽ More

    Submitted 13 July, 2018; originally announced July 2018.

    Comments: 5 pages, 4 figures, to appear as a brief announcement at 2018 International Symposium on Distributed Computing (2018)

  10. arXiv:1708.03274  [pdf, ps, other

    cs.DC

    Simulating a Shared Register in a System that Never Stops Changing

    Authors: Hagit Attiya, Hyun Chul Chung, Faith Ellen, Saptaparni Kumar, Jennifer L. Welch

    Abstract: Simulating a shared register can mask the intricacies of designing algorithms for asynchronous message-passing systems subject to crash failures, since it allows them to run algorithms designed for the simpler shared-memory model. Typically such simulations replicate the value of the register in multiple servers and require readers and writers to communicate with a majority of servers. The success… ▽ More

    Submitted 10 August, 2017; originally announced August 2017.

  11. arXiv:0806.1271  [pdf, ps, other

    cs.NI

    Scheduling Sensors by Tiling Lattices

    Authors: Andreas Klappenecker, Hyunyoung Lee, Jennifer L. Welch

    Abstract: Suppose that wirelessly communicating sensors are placed in a regular fashion on the points of a lattice. Common communication protocols allow the sensors to broadcast messages at arbitrary times, which can lead to problems should two sensors broadcast at the same time. It is shown that one can exploit a tiling of the lattice to derive a deterministic periodic schedule for the broadcast communic… ▽ More

    Submitted 7 June, 2008; originally announced June 2008.

    Comments: 9 pages, 11 figures