Skip to main content

Showing 1–27 of 27 results for author: Blackburn, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.12124  [pdf, ps, other

    cs.IT

    On de Bruijn Array Codes Part II: Linear Codes

    Authors: Simon Blackburn, Yeow Meng Chee, Tuvi Etzion, Huimin Lao

    Abstract: An M-sequence generated by a primitive polynomial has many interesting and desirable properties. A pseudo-random array is the two-dimensional generalization of an M-sequence. Similarly to primitive polynomials, there are irreducible and reducible polynomials whose all nonzero sequences have the same length. In this paper, a two-dimensional generalization for such sequences is given. This generaliz… ▽ More

    Submitted 18 June, 2025; v1 submitted 21 January, 2025; originally announced January 2025.

  2. arXiv:2405.01616  [pdf, other

    q-bio.BM cs.AI cs.LG

    Generative Active Learning for the Search of Small-molecule Protein Binders

    Authors: Maksym Korablyov, Cheng-Hao Liu, Moksh Jain, Almer M. van der Sloot, Eric Jolicoeur, Edward Ruediger, Andrei Cristian Nica, Emmanuel Bengio, Kostiantyn Lapchevskyi, Daniel St-Cyr, Doris Alexandra Schuetz, Victor Ion Butoi, Jarrid Rector-Brooks, Simon Blackburn, Leo Feng, Hadi Nekoei, SaiKrishna Gottipati, Priyesh Vijayan, Prateek Gupta, Ladislav Rampášek, Sasikanth Avancha, Pierre-Luc Bacon, William L. Hamilton, Brooks Paige, Sanchit Misra , et al. (9 additional authors not shown)

    Abstract: Despite substantial progress in machine learning for scientific discovery in recent years, truly de novo design of small molecules which exhibit a property of interest remains a significant challenge. We introduce LambdaZero, a generative active learning approach to search for synthesizable molecules. Powered by deep reinforcement learning, LambdaZero learns to search over the vast space of molecu… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  3. arXiv:2211.10309  [pdf, ps, other

    cs.IT cs.DM math.CO

    Constructions and bounds for codes with restricted overlaps

    Authors: Simon R. Blackburn, Navid Nasr Esfahani, Donald L. Kreher, Douglas R. Stinson

    Abstract: Non-overlapping codes have been studied for almost 60 years. In such a code, no proper, non-empty prefix of any codeword is a suffix of any codeword. In this paper, we study codes in which overlaps of certain specified sizes are forbidden. We prove some general bounds and we give several constructions in the case of binary codes. Our techniques also allow us to provide an alternative, elementary p… ▽ More

    Submitted 22 August, 2023; v1 submitted 18 November, 2022; originally announced November 2022.

    Comments: 17 pages. Theorems etc renumbered

    MSC Class: 94A45

  4. Low-Latency, High-Throughput Garbage Collection (Extended Version)

    Authors: Wenyu Zhao, Stephen M. Blackburn, Kathryn S. McKinley

    Abstract: Production garbage collectors make substantial compromises in pursuit of reduced pause times. They require far more CPU cycles and memory than prior simpler collectors. concurrent copying collectors (C4, ZGC, and Shenandoah) suffer from the following design limitations. 1) Concurrent copying. They only reclaim memory by copying, which is inherently expensive with high memory bandwidth demands. Con… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

    Comments: 17 pages, 7 Figures. This extends the original publication with an LBO analysis (Section 5.5)

    ACM Class: D.3.4

    Journal ref: p76-91,PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13 - 17, 2022

  5. arXiv:2210.14100  [pdf, ps, other

    cs.IT cs.DM math.CO

    The capacity of a finite field matrix channel

    Authors: Simon R. Blackburn, Jessica Claridge

    Abstract: The Additive-Multiplicative Matrix Channel (AMMC) was introduced by Silva, Kschischang and Kötter in 2010 to model data transmission using random linear network coding. The input and output of the channel are $n\times m$ matrices over a finite field $\mathbb{F}_q$. On input the matrix $X$, the channel outputs $Y=A(X+W)$ where $A$ is a uniformly chosen $n\times n$ invertible matrix over… ▽ More

    Submitted 20 January, 2025; v1 submitted 25 October, 2022; originally announced October 2022.

    Comments: 31 pages, 1 figure. Minor changes for clarity

    MSC Class: 94A40

  6. Distilling the Real Cost of Production Garbage Collectors

    Authors: Zixian Cai, Stephen M. Blackburn, Michael D. Bond, Martin Maas

    Abstract: Abridged abstract: despite the long history of garbage collection (GC) and its prevalence in modern programming languages, there is surprisingly little clarity about its true cost. Without understanding their cost, crucial tradeoffs made by garbage collectors (GCs) go unnoticed. This can lead to misguided design constraints and evaluation criteria used by GC researchers and users, hindering the de… ▽ More

    Submitted 5 May, 2022; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: Camera-ready version

  7. arXiv:2004.12485  [pdf, other

    cs.LG cs.AI

    Learning To Navigate The Synthetically Accessible Chemical Space Using Reinforcement Learning

    Authors: Sai Krishna Gottipati, Boris Sattarov, Sufeng Niu, Yashaswi Pathak, Haoran Wei, Shengchao Liu, Karam M. J. Thomas, Simon Blackburn, Connor W. Coley, Jian Tang, Sarath Chandar, Yoshua Bengio

    Abstract: Over the last decade, there has been significant progress in the field of machine learning for de novo drug design, particularly in deep generative models. However, current generative approaches exhibit a significant challenge as they do not ensure that the proposed molecular structures can be feasibly synthesized nor do they provide the synthesis routes of the proposed small molecules, thereby se… ▽ More

    Submitted 19 May, 2020; v1 submitted 26 April, 2020; originally announced April 2020.

    Comments: added the statistics of top-100 compounds used logP metric with scaled components added values of the initial reactants to the box plots some values in tables are recalculated due to the inconsistent environments on different machines. corresponding benchmarks were rerun with the requirements on github. no significant changes in the results. corrected figures in the Appendix

  8. arXiv:1909.02212  [pdf, other

    cs.DL cs.SI

    Author Growth Outstrips Publication Growth in Computer Science and Publication Quality Correlates with Collaboration

    Authors: Stephen M. Blackburn, Kathryn S. McKinley, Lexing Xie

    Abstract: Although the computer science community successfully harnessed exponential increases in computer performance to drive societal and economic change, the exponential growth in publications is proving harder to accommodate. To gain a deeper understanding of publication growth and inform how the computer science community should handle this growth, we analyzed publication practices from several perspe… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

  9. arXiv:1907.12748  [pdf, other

    cs.HC

    Influence Flowers of Academic Entities

    Authors: Minjeong Shin, Alexander Soen, Benjamin T. Readshaw, Stephen M. Blackburn, Mitchell Whitelaw, Lexing Xie

    Abstract: We present the Influence Flower, a new visual metaphor for the influence profile of academic entities, including people, projects, institutions, conferences, and journals. While many tools quantify influence, we aim to expose the flow of influence between entities. The Influence Flower is an ego-centric graph, with a query entity placed in the centre. The petals are styled to reflect the strength… ▽ More

    Submitted 30 July, 2019; originally announced July 2019.

    Comments: VAST 2019

  10. arXiv:1810.07970  [pdf, other

    math.CO cs.DM

    Inglenook Shunting Puzzles

    Authors: Simon R. Blackburn

    Abstract: An inglenook puzzle is a classic shunting (switching) puzzle often found on model railway layouts. A collection of wagons sits in a fan of sidings with a limited length headshunt (lead track). The aim of the puzzle is to rearrange the wagons into a desired order (often a randomly chosen order). This article answers the question: When can you be sure this can always be done? The problem of finding… ▽ More

    Submitted 3 April, 2019; v1 submitted 18 October, 2018; originally announced October 2018.

    Comments: 23 pages, 4 figures. Minor typos in previous version corrected

    MSC Class: 68P10

  11. arXiv:1807.06036  [pdf, other

    cs.IR cs.LG stat.ML

    Pangloss: Fast Entity Linking in Noisy Text Environments

    Authors: Michael Conover, Matthew Hayes, Scott Blackburn, Pete Skomoroch, Sam Shah

    Abstract: Entity linking is the task of mapping potentially ambiguous terms in text to their constituent entities in a knowledge base like Wikipedia. This is useful for organizing content, extracting structured data from textual documents, and in machine learning relevance applications like semantic search, knowledge graph construction, and question answering. Traditionally, this work has focused on text th… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: KDD 2018

  12. arXiv:1807.00071  [pdf

    cs.GL cs.DL

    GOTO Rankings Considered Helpful

    Authors: Emery Berger, Stephen M. Blackburn, Carla Brodley, H. V. Jagadish, Kathryn S. McKinley, Mario A. Nascimento, Minjeong Shin, Lexing Xie

    Abstract: Rankings are a fact of life. Whether or not one likes them, they exist and are influential. Within academia, and in computer science in particular, rankings not only capture our attention but also widely influence people who have a limited understanding of computing science research, including prospective students, university administrators, and policy-makers. In short, rankings matter. This posit… ▽ More

    Submitted 24 April, 2019; v1 submitted 29 June, 2018; originally announced July 2018.

    Comments: Accepted, to appear in Communications of the ACM

  13. arXiv:1609.07070  [pdf, ps, other

    cs.IT

    PIR Array Codes with Optimal PIR Rates

    Authors: Simon R. Blackburn, Tuvi Etzion

    Abstract: There has been much recent interest in Private information Retrieval (PIR) in models where a database is stored across several servers using coding techniques from distributed storage, rather than being simply replicated. In particular, a recent breakthrough result of Fazelli, Vardy and Yaakobi introduces the notion of a PIR code and a PIR array code, and uses this notion to produce efficient prot… ▽ More

    Submitted 17 December, 2016; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: A conference version for arXiv:1607.00235

  14. arXiv:1609.07027  [pdf, ps, other

    cs.IT cs.CR

    PIR schemes with small download complexity and low storage requirements

    Authors: Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson

    Abstract: In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there… ▽ More

    Submitted 4 December, 2018; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: 30 pages. Minor updates and corrections throughout, with updated bibliography

    MSC Class: 94A60

  15. arXiv:1607.00235  [pdf, ps, other

    cs.IT

    PIR Array Codes with Optimal Virtual Server Rate

    Authors: Simon Blackburn, Tuvi Etzion

    Abstract: There has been much recent interest in Private information Retrieval (PIR) in models where a database is stored across several servers using coding techniques from distributed storage, rather than being simply replicated. In particular, a recent breakthrough result of Fazelli, Vardy and Yaakobi introduces the notion of a PIR code and a PIR array code, and uses this notion to produce efficient PIR… ▽ More

    Submitted 6 February, 2018; v1 submitted 1 July, 2016; originally announced July 2016.

  16. arXiv:1602.00860  [pdf, ps, other

    cs.CR math.GR

    On the security of the Algebraic Eraser tag authentication protocol

    Authors: Simon R. Blackburn, M. J. B. Robshaw

    Abstract: The Algebraic Eraser has been gaining prominence as SecureRF, the company commercializing the algorithm, increases its marketing reach. The scheme is claimed to be well-suited to IoT applications but a lack of detail in available documentation has hampered peer-review. Recently more details of the system have emerged after a tag authentication protocol built using the Algebraic Eraser was proposed… ▽ More

    Submitted 2 June, 2016; v1 submitted 2 February, 2016; originally announced February 2016.

    Comments: 21 pages. Minor changes. Final version accepted for ACNS 2016

    MSC Class: 94A60

  17. arXiv:1601.06037  [pdf, other

    cs.IT

    Finite field matrix channels for network coding

    Authors: Simon R. Blackburn, Jessica Claridge

    Abstract: In 2010, Silva, Kschischang and Kötter studied certain classes of finite field matrix channels in order to model random linear network coding where exactly $t$ random errors are introduced. In this paper we consider a generalisation of these matrix channels where the number of errors is not required to be constant, indeed the number of errors may follow any distribution. We show that a capacity-… ▽ More

    Submitted 31 January, 2018; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: 21 pages. A significant revision: the main counting arguments shortened; computational results added; other minor revisions throughout

    MSC Class: 94A40

  18. arXiv:1511.03870  [pdf, ps, other

    math.GR cs.CR

    A Practical Cryptanalysis of the Algebraic Eraser

    Authors: Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban

    Abstract: Anshel, Anshel, Goldfeld and Lemieaux introduced the Colored Burau Key Agreement Protocol (CBKAP) as the concrete instantiation of their Algebraic Eraser scheme. This scheme, based on techniques from permutation groups, matrix groups and braid groups, is designed for lightweight environments such as RFID tags and other IoT applications. It is proposed as an underlying technology for ISO/IEC 29167-… ▽ More

    Submitted 2 June, 2016; v1 submitted 12 November, 2015; originally announced November 2015.

    Comments: 15 pages. Updated references, with brief comments added. Minor typos corrected. Final version, accepted for CRYPTO 2016

    MSC Class: 20F36; 94A60; 20B40

  19. arXiv:1509.02748  [pdf, other

    cs.IT

    Maximum likelihood decoding for multilevel channels with gain and offset mismatch

    Authors: Simon R. Blackburn

    Abstract: K.A.S. Immink and J.H. Weber recently defined and studied a channel with both gain and offset mismatch, modelling the behaviour of charge-leakage in flash memory. They proposed a decoding measure for this channel based on minimising Pearson distance (a notion from cluster analysis). The paper derives a formula for maximum likelihood decoding for this channel, and also defines and justifies a notio… ▽ More

    Submitted 9 September, 2015; originally announced September 2015.

    Comments: 17 pages, 7 figures

  20. Pearson codes

    Authors: Jos H. Weber, Kees A. Schouhamer Immink, Simon R. Blackburn

    Abstract: The Pearson distance has been advocated for improving the error performance of noisy channels with unknown gain and offset. The Pearson distance can only fruitfully be used for sets of $q$-ary codewords, called Pearson codes, that satisfy specific properties. We will analyze constructions and properties of optimal Pearson codes. We will compare the redundancy of optimal Pearson codes with the redu… ▽ More

    Submitted 29 September, 2015; v1 submitted 1 September, 2015; originally announced September 2015.

    Comments: 17 pages. Minor revisions and corrections since previous version. Author biographies added. To appear in IEEE Trans. Inform. Theory

  21. arXiv:1505.02597  [pdf, ps, other

    cs.IT cs.DM math.CO

    Probabilistic existence results for separable codes

    Authors: Simon R. Blackburn

    Abstract: Separable codes were defined by Cheng and Miao in 2011, motivated by applications to the identification of pirates in a multimedia setting. Combinatorially, $\overline{t}$-separable codes lie somewhere between $t$-frameproof and $(t-1)$-frameproof codes: all $t$-frameproof codes are $\overline{t}$-separable, and all $\overline{t}$-separable codes are $(t-1)$-frameproof. Results for frameproof code… ▽ More

    Submitted 25 August, 2015; v1 submitted 11 May, 2015; originally announced May 2015.

    Comments: 16 pages. Typos corrected and minor changes since last version. Accepted by IEEE Transactions on Information Theory

  22. arXiv:1303.1026  [pdf, ps, other

    cs.DM cs.IT math.CO

    Non-overlapping codes

    Authors: Simon R. Blackburn

    Abstract: We say that a $q$-ary length $n$ code is \emph{non-overlapping} if the set of non-trivial prefixes of codewords and the set of non-trivial suffices of codewords are disjoint. These codes were first studied by Levenshtein in 1964, motivated by applications in synchronisation. More recently these codes were independently invented (under the name \emph{cross-bifix-free} codes) by Bajić and Stojanović… ▽ More

    Submitted 8 July, 2015; v1 submitted 5 March, 2013; originally announced March 2013.

    Comments: 14 pages. Extra explanations added at some points, and an extra citation. To appear in IEEE Trans Information Theory

  23. arXiv:1111.2713  [pdf, ps, other

    cs.DM

    The asymptotic behavior of Grassmannian codes

    Authors: Simon R. Blackburn, Tuvi Etzion

    Abstract: The iterated Johnson bound is the best known upper bound on a size of an error-correcting code in the Grassmannian $\mathcal{G}_q(n,k)$. The iterated Schönheim bound is the best known lower bound on the size of a covering code in $\mathcal{G}_q(n,k)$. We use probabilistic methods to prove that both bounds are asymptotically attained for fixed $k$ and fixed radius, as $n$ approaches infinity. We al… ▽ More

    Submitted 11 November, 2011; originally announced November 2011.

    Comments: 5 pages

    MSC Class: 94B60

  24. arXiv:1102.2358  [pdf, ps, other

    math.GR cs.CR

    Cryptanalysis of three matrix-based key establishment protocols

    Authors: Simon R. Blackburn, Carlos Cid, Ciaran Mullan

    Abstract: We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to Romanczuk and Ustimenko.

    Submitted 11 February, 2011; originally announced February 2011.

    Comments: 9 pages

  25. arXiv:1102.1053  [pdf, ps, other

    math.NT cs.CR

    On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves

    Authors: Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski

    Abstract: Given a prime $p$, an elliptic curve $\E/\F_p$ over the finite field $\F_p$ of $p$ elements and a binary \lrs\ $\(u(n)\)_{n =1}^\infty$ of order~$r$, we study the distribution of the sequence of points $$ \sum_{j=0}^{r-1} u(n+j)P_j, \qquad n =1,..., N, $$ on average over all possible choices of $\F_p$-rational points $P_1,..., P_r$ on~$\E$. For a sufficiently large $N$ we improve and generalise a… ▽ More

    Submitted 5 February, 2011; originally announced February 2011.

    MSC Class: Primary 11K45; 11T71; Secondary 11G05; 11T23; 65C05; 94A60

  26. arXiv:1101.1172  [pdf, ps, other

    math.CO cs.DM

    The existence of k-radius sequences

    Authors: Simon R Blackburn

    Abstract: Let $n$ and $k$ be positive integers, and let $F$ be an alphabet of size $n$. A sequence over $F$ of length $m$ is a \emph{$k$-radius sequence} if any two distinct elements of $F$ occur within distance $k$ of each other somewhere in the sequence. These sequences were introduced by Jaromczyk and Lonc in 2004, in order to produce an efficient caching strategy when computing certain functions on larg… ▽ More

    Submitted 5 August, 2011; v1 submitted 6 January, 2011; originally announced January 2011.

    Comments: 8 pages. More papers cited, and a minor reorganisation of the last section, since last version. Typo corrected in the statement of Theorem 4

    MSC Class: 94A55

  27. arXiv:0910.4325  [pdf, ps, other

    cs.DM

    Putting Dots in Triangles

    Authors: Simon R. Blackburn, Maura B. Paterson, Douglas R. Stinson

    Abstract: Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that $N(n) = \lfloor \frac{2n+1}{3} \rfloor$. In this no… ▽ More

    Submitted 18 May, 2010; v1 submitted 22 October, 2009; originally announced October 2009.

    Comments: 10 pages Minor rephrasing: final version to submit to journal.