The proceedings contain 56 papers. The topics discussed include: affecting user’s self-esteem: analysis under the self-determination theory perspective and design recommendations;analysis and convergence of stu...
ISBN:
(纸本)9781450386173
The proceedings contain 56 papers. The topics discussed include: affecting user’s self-esteem: analysis under the self-determination theory perspective and design recommendations;analysis and convergence of studies on recommendations for digital memorials;analysis of the user experience with a multiperspective tool for explainable machine learning in light of interactive principles;analytical model for classifying areas of interest in interactive systems;analyzing the presentation of multilingual user reviews in accommodation websites;applying usability heuristics in the context of labeling systems;beyond barriers: a practical analysis of the SIM-SR method to inspect the communicability of interactive systems for visually impaired users;building an iot programming environment with and for preschool children;and challenges of interaction design for counter-hegemonic contexts: highlighting and overcoming contradictions for social transformation and responsiveness.
Much progress has recently been made in understanding the complexity landscape of subgraph finding problems in the CONGEST model of distributedcomputing. However, so far, very few tight bounds are known in this area....
详细信息
ISBN:
(纸本)9781611976465
Much progress has recently been made in understanding the complexity landscape of subgraph finding problems in the CONGEST model of distributedcomputing. However, so far, very few tight bounds are known in this area. For triangle (i.e., 3-clique) listing, an optimal (O) over tilde (n(1/3))-round distributed algorithm has been constructed by Chang et al. [SODA 2019, PODC 2019]. Recent works of Eden et al. [DISC 2019] and of Censor-Hillel et al. [PODC 2020] have shown sublinear algorithms for K-p-listing, for each p >= 4, but still leaving a significant gap between the upper bounds and the known lower bounds of the problem. In this paper, we completely close this gap. We show that for each p >= 4, there is an (O) over tilde (n(1-2/p))-round distributed algorithm that lists all p-cliques K-p in the communication network. Our algorithm is optimal up to a polylogarithmic factor, due to the (Omega) over tilde (n(1-2/p))-round lower bound of Fischer et al. [SPAA 2018], which holds even in the CONGESTED CLIQUE model. Together with the trianglelisting algorithm by Chang et al. [SODA 2019, PODC 2019], our result thus shows that the round complexity of K-p-listing, for all p, is the same in both the CONGEST and CONGESTED CLIQUE models, at (Theta) over tilde (n(1-2/p)) rounds. For p = 4, our result additionally matches the (Omega) over tilde (n(1/2)) lower bound for K-4 -detection by Czumaj and Konrad [DISC 2018], implying that the round complexities for detection and listing of K-4 are equivalent in the CONGEST model.
The Lovász Local Lemma is a versatile result in probability theory, characterizing circumstances in which a collection of n ‘bad events’, each occurring with probability at most p and dependent on a set of unde...
详细信息
ISBN:
(纸本)9798400715105
The Lovász Local Lemma is a versatile result in probability theory, characterizing circumstances in which a collection of n ‘bad events’, each occurring with probability at most p and dependent on a set of underlying random variables, can be avoided. It is a central tool of the probabilistic method, since it can be used to show that combinatorial objects satisfying some desirable properties must exist. While the original proof was existential, subsequent work has shown algorithms for the Lovász Local Lemma: that is, in circumstances in which the lemma proves the existence of some object, these algorithms can constructively find such an object. One main strand of these algorithms, which began with Moser and Tardos’s well-known result (Jacm 2010), involves iteratively resampling the dependent variables of satisfied bad events until none remain *** this paper, we present a novel analysis that can be applied to resampling-style Lovász Local Lemma algorithms. This analysis shows that an output assignment for the dependent variables of most events can be determined only from O(loglog1/p n)-radius local neighborhoods, and that the events whose variables may still require resampling can be identified from these neighborhoods. This allows us to improve randomized complexities for the constructive Lovász Local Lemma (with polynomial criterion) in several parallel and distributed *** particular, we obtain a LOCAL algorithm with O(loglog1/p n) node-averaged complexity (while matching the O(log1/p n) worst-case complexity of Chung, Pettie, and Su), an algorithm for the LCA and VOLUME models requiring dO(loglog1/p n) probes per query, and an O(logloglog1/p n)-round algorithm for the CONGESTED CLIQUE, linear space MPC, and Heterogenous MPC models.
Most CS1 classes are designed to teach programming and computational thinking using a specific programming language such as Python or Java. This type of in-depth study leaves little room for creative exploration by st...
详细信息
ISBN:
(纸本)9798400704246
Most CS1 classes are designed to teach programming and computational thinking using a specific programming language such as Python or Java. This type of in-depth study leaves little room for creative exploration by students. In particular, at large colleges and universities, the programming assignments are usually autograded to keep up with expanding enrollment. This lightning talk will introduce the idea that simply adding three creative labs that do not use the actual course material, but instead expose students to other computing concepts, can give the students who are struggling a chance to catch up, while also offering them a much-needed breather doing something in computing that is individually directed and *** the last few years, my Teaching Assistants (TAs) and I have developed three simple web development labs as assignments for our large CS1 classes. These three labs are usually given around each of the exam weeks and provide a much-needed break for the students from the regular class material that continues to build upon prior learning. Many students report that the labs were their favorite part of the course because they were creative and *** lightning talk aims to gather feedback on this concept and assess its potential for integration into advanced CS courses. I'm also keen to hear suggestions for alternative labs in a CS1 class that would both introduce students to further CS principles and allow them to showcase their creativity.
This paper proposes a framework called SnuRHAC, which provides an illusion of a single GPU for the multiple GPUs in a cluster. Under SnuRHAC, a CUDA program designed to use a single GPU can utilize multiple GPUs in a ...
详细信息
ISBN:
(纸本)9781450382175
This paper proposes a framework called SnuRHAC, which provides an illusion of a single GPU for the multiple GPUs in a cluster. Under SnuRHAC, a CUDA program designed to use a single GPU can utilize multiple GPUs in a cluster without any source code modification. SnuRHAC automatically distributes workload to multiple GPUs in a cluster and manages data across the nodes. To manage data efficiently, SnuRHAC extends CUDA Unified Memory and exploits its page fault mechanism. We also propose two prefetching techniques to fully exploit UM and to maximize performance. Static prefetching allows SnuRHAC to prefetch data by statically analyzing CUDA kernels. Dynamic prefetching complements static prefetching. SnuRHAC enforces an application to run on a single GPU if it is not suitable for multiple GPUs. We evaluate the performance of SnuRHAC using 18 benchmark applications from various sources. The evaluation result shows that while SnuRHAC significantly improves ease-of-programming, it shows scalable performance for the cluster environment depending on the application characteristics.
Verification and validation (V&V) are essential concerns in the development of safety-critical distributed software systems. V&V efforts targeting full system implementations rely on testing, which requires re...
Verification and validation (V&V) are essential concerns in the development of safety-critical distributed software systems. V&V efforts targeting full system implementations rely on testing, which requires real-world deployments and cumbersome analysis to track down issues across distributed software components. Here, we propose a simulation-based development and testing framework for distributed systems following the event-driven architecture (EDA) paradigm. During development, unmodified software components can be executed in their interaction with a simulated environment, allowing for early testing under envisioned deployments. After introducing the interplay of EDA and discrete-event simulation, we present our framework's architecture and the API offered to software components, which closely follows accepted EDA principles. We demonstrate the use of our framework on a medical software system used in the diagnosis of rare genetic diseases. By observing the system's interaction with simulated laboratories, the feedback loop between diagnoses by laboratories and classifications from the software system is evaluated.
Equitable computer science (CS) instruction for marginalized students and in poor communities everywhere is hindered by social barriers such as 1) the lack of teacher expertise with knowledge to positively engage marg...
详细信息
ISBN:
(纸本)9781450394338
Equitable computer science (CS) instruction for marginalized students and in poor communities everywhere is hindered by social barriers such as 1) the lack of teacher expertise with knowledge to positively engage marginalized students in CS, especially in Advanced Placement CS courses, and 2) racially segregated communities and schools that permeate in states like Georgia, and others across the nation. The racial segregation of students, including but not limited to Native American, Black and Hispanic groups, keeps them perpetually locked out of quality CS education. That said, AP CS principles often provides the first AP STEM experience for Black, Hispanic, and first-generation students who take it. Furthermore, students who take AP CS principles are more likely to declare a STEM or CS major in college [1]. Leaders of this BOF will provide opportunities for CS educators, researchers, and practitioners to discuss their efforts on broadening participation in computing at the high school level, and participants will also be able to generate recommendations and strategies that move efforts toward ensuring equity in AP CS courses for historically underrepresented students in CS.
The discussion around "safe" programming languages has significantly increased in recent years, and is impacting how governments, industry, and academia plan to develop current and future software products. ...
详细信息
ISBN:
(纸本)9798350355543
The discussion around "safe" programming languages has significantly increased in recent years, and is impacting how governments, industry, and academia plan to develop current and future software products. The White House Office of the National Cyber Director released a report [1] in February 2024 calling on the technical community to work towards proactively reducing attack surfaces in cyberspace, in part, specifically by adopting memory safe programming languages. While the main discourse thus far has been focused on cybersecurity, memory safety issues are also a concern in HPC, where memory related errors can result in wasted execution time, incorrect results, etc. Legacy programming languages in HPC such as C and C++ provide freedom and flexibility with memory management, but requires the developer to guarantee safety. While it is possible to develop "un-safe" code in all programming languages, "memory-safe" languages help guarantee safety by utilizing various compile time and runtime checks and validation *** this paper we introduce Lamellar, an asynchronous tasking and PGAS runtime system for HPC written in Rust, one such "memory-safe" language. We describe the entire Lamellar stack, from network interfaces to safe high-level abstractions such as distributed LamellarArrays and Active Messages. The goal of our runtime is to enable end-users to develop entirely safe Rust code in their applications, limiting the use of any "unsafe" code blocks to rigorously tested code blocks within the runtime itself. We conclude by showing comparable performance against several C, C++, and Chapel implementations of a subset of the BALE kernel suite while maintaining strong memory safety principles.
We present improved algorithms for approximating maximum-weight independent set (MaxIS) in the CONGEST model. Given an input graph, let n and Delta be the number of nodes and maximum degree, respectively, and let MIS(...
详细信息
ISBN:
(纸本)9781450375825
We present improved algorithms for approximating maximum-weight independent set (MaxIS) in the CONGEST model. Given an input graph, let n and Delta be the number of nodes and maximum degree, respectively, and let MIS(n,Delta ) be the running time of finding a maximal independent set (MIS) in the CONGEST model. Bar-Yehuda et al. [PODC 2017] showed that there is an algorithm in the CONGEST model that finds a.-approximation for MaxIS in O ( MIS(n,Delta) log W) rounds, where.. is the maximum weight of a node in the graph, which can be as high as poly(n). Whether their algorithm is deterministic or randomized depends on the MIS algorithm that is used as a black-box. Our results: (1) A deterministic O(MIS(n, Delta)/epsilon)-round algorithm that finds a (1 + epsilon)Delta-approximation for MaxIS in the CONGEST model. (2) Arandomized ( poly( log log n)/epsilon)-round algorithm that finds, with high probability, a (1 +epsilon)Delta-approximation for MaxIS in the CONGEST model. That is, by sacrificing only a tiny fraction of the approximation guarantee, we achieve an exponential speed-up in the running time over the previous best known result.
暂无评论