Skip to main content

Showing 1–24 of 24 results for author: Kogan, A

  1. arXiv:2404.05011  [pdf, other

    cs.SE

    A Hybrid Execution Environment for Computer-Interpretable Guidelines in PROforma

    Authors: Alexandra Kogan, Roy Leizer, Szymon Wilk, David Glasspool

    Abstract: In this paper, we share our experience of developing a hybrid execution environment for computer-interpretable guidelines (CIGs) in PROforma. The proposed environment is part of the CAPABLE system which provides coaching for cancer patients and decision support for physicians. It extends a standard PROforma execution engine - Deontics Engine (DE) - with additional components that act as wrappers a… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: Presented as a short paper at the Knowledge Representation for Healthcare 2023 (KR4HC 2023) workshop

  2. arXiv:2402.17392  [pdf, other

    cs.CL

    Spot the bot: Coarse-Grained Partition of Semantic Paths for Bots and Humans

    Authors: Vasilii A. Gromov, Alexandra S. Kogan

    Abstract: Nowadays, technology is rapidly advancing: bots are writing comments, articles, and reviews. Due to this fact, it is crucial to know if the text was written by a human or by a bot. This paper focuses on comparing structures of the coarse-grained partitions of semantic paths for human-written and bot-generated texts. We compare the clusterizations of datasets of n-grams from literary texts and text… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Journal ref: Pattern Recognition and Machine Intelligence, 2023. pp. 348--355

  3. arXiv:2301.05099  [pdf, other

    cs.LG cs.AI cs.DC

    Improving Inference Performance of Machine Learning with the Divide-and-Conquer Principle

    Authors: Alex Kogan

    Abstract: Many popular machine learning models scale poorly when deployed on CPUs. In this paper we explore the reasons why and propose a simple, yet effective approach based on the well-known Divide-and-Conquer Principle to tackle this problem of great practical importance. Given an inference job, instead of using all available computing resources (i.e., CPU cores) for running it, the idea is to break the… ▽ More

    Submitted 1 March, 2023; v1 submitted 12 January, 2023; originally announced January 2023.

    ACM Class: I.2.0; D.1.3; D.4.8

  4. arXiv:2105.07497  [pdf, other

    cs.DC

    Intra-process Caching and Reuse of Threads

    Authors: Dave Dice, Alex Kogan

    Abstract: Creating and destroying threads on modern Linux systems incurs high latency, absent concurrency, and fails to scale as we increase concurrency. To address this concern we introduce a process-local cache of idle threads. Specifically, instead of destroying a thread when it terminates, we cache and then recycle that thread in the context of subsequent thread creation requests. This approach shows si… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    ACM Class: D.4.1

  5. arXiv:2105.06961  [pdf, other

    cs.DC

    Ready When You Are: Efficient Condition Variables via Delegated Condition Evaluation

    Authors: Dave Dice, Alex Kogan

    Abstract: Multi-thread applications commonly utilize condition variables for communication between threads. Condition variables allow threads to block and wait until a certain condition holds, and also enable threads to wake up their blocked peers notifying them about a change to the state of shared data. Quite often such notifications are delivered to all threads, while only a small number of specific thre… ▽ More

    Submitted 14 May, 2021; originally announced May 2021.

    ACM Class: D.4.1

  6. arXiv:2102.06621  [pdf, other

    cs.CL cs.AI cs.DC cs.LG cs.MS

    Optimizing Inference Performance of Transformers on CPUs

    Authors: Dave Dice, Alex Kogan

    Abstract: The Transformer architecture revolutionized the field of natural language processing (NLP). Transformers-based models (e.g., BERT) power many important Web services, such as search, translation, question-answering, etc. While enormous research attention is paid to the training of those models, relatively little efforts are made to improve their inference performance. This paper comes to address th… ▽ More

    Submitted 22 February, 2021; v1 submitted 12 February, 2021; originally announced February 2021.

    ACM Class: I.2.0; D.4.8; G.4

  7. arXiv:2102.04188  [pdf, other

    cs.SE

    Compact Java Monitors

    Authors: Dave Dice, Alex Kogan

    Abstract: For scope and context, the idea we'll describe below, Compact Java Monitors, is intended as a potential replacement implementation for the "synchronized" construct in the HotSpot JVM. The readers is assumed to be familiar with current HotSpot implementation.

    Submitted 26 September, 2021; v1 submitted 28 January, 2021; originally announced February 2021.

  8. arXiv:2102.03863  [pdf, other

    cs.DC cs.OS

    Hemlock : Compact and Scalable Mutual Exclusion

    Authors: Dave Dice, Alex Kogan

    Abstract: We present Hemlock, a novel mutual exclusion locking algorithm that is extremely compact, requiring just one word per thread plus one word per lock, but which still provides local spinning in most circumstances, high throughput under contention, and low latency in the uncontended case. Hemlock is context-free -- not requiring any information to be passed from a lock operation to the corresponding… ▽ More

    Submitted 5 January, 2022; v1 submitted 7 February, 2021; originally announced February 2021.

    ACM Class: D.4.1

  9. arXiv:2008.02527  [pdf, other

    cs.DC

    Efficient Multi-word Compare and Swap

    Authors: Rachid Guerraoui, Alex Kogan, Virendra J. Marathe, Igor Zablotchi

    Abstract: Atomic lock-free multi-word compare-and-swap (MCAS) is a powerful tool for designing concurrent algorithms. Yet, its widespread usage has been limited because lock-free implementations of MCAS make heavy use of expensive compare-and-swap (CAS) instructions. Existing MCAS implementations indeed use at least 2k+1 CASes per k-CAS. This leads to the natural desire to minimize the number of CASes requi… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: Full version of DISC '20 paper

  10. Scalable Range Locks for Scalable Address Spaces and Beyond

    Authors: Alex Kogan, Dave Dice, Shady Issa

    Abstract: Range locks are a synchronization construct designed to provide concurrent access to multiple threads (or processes) to disjoint parts of a shared resource. Originally conceived in the file system context, range locks are gaining increasing interest in the Linux kernel community seeking to alleviate bottlenecks in the virtual memory management subsystem. The existing implementation of range locks… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

    Comments: 17 pages, 9 figures, Eurosys 2020

    ACM Class: D.1.3; D.4.1; D.4.2

  11. arXiv:2003.05025  [pdf, other

    cs.OS

    Fissile Locks

    Authors: Dave Dice, Alex Kogan

    Abstract: Classic test-and-test (TS) mutual exclusion locks are simple, and enjoy high performance and low latency of ownership transfer under light or no contention. However, they do not scale gracefully under high contention and do not provide any admission order guarantees. Such concerns led to the development of scalable queue-based locks, such as a recent Compact NUMA-aware (CNA) lock, a variant of ano… ▽ More

    Submitted 1 May, 2020; v1 submitted 10 March, 2020; originally announced March 2020.

  12. Non-congruent non-degenerate curves with identical signatures

    Authors: Eric Geiger, Irina A. Kogan

    Abstract: While the equality of differential signatures (Calabi et al, Int. J. Comput. Vis. 26: 107-135, 1998) is known to be a necessary condition for congruence, it is not sufficient (Musso and Nicolodi, J. Math Imaging Vis. 35: 68-85, 2009). Hickman (J. Math Imaging Vis. 43: 206-213, 2012, Theorem 2) claimed that for non-degenerate planar curves, equality of Euclidean signatures implies congruence. We pr… ▽ More

    Submitted 22 July, 2021; v1 submitted 19 December, 2019; originally announced December 2019.

    Comments: 33 pages, 22 figures. Page 20: In the proof of Corollary 31 the notation for the length, $L_W$, of a reconstructed curve $Γ_W$ is introduced and defined. Page 23: The upper bound on the integral in equation (35) is updated to use $L_W$ instead of $L$ and the definition of $L_W$ is referred to. Page 23: The assumption "$m$ and $ξ$ are relatively prime" is added to Proposition 36

    MSC Class: 53A04; 53A55; 68T45 ACM Class: I.2.10

    Journal ref: Journal of Mathematical Imaging and Vision, 63, 601-625 (2021)

  13. arXiv:1905.10818  [pdf, other

    cs.OS

    Avoiding Scalability Collapse by Restricting Concurrency

    Authors: Dave Dice, Alex Kogan

    Abstract: Saturated locks often degrade the performance of a multithreaded application, leading to a so-called scalability collapse problem. This problem arises when a growing number of threads circulating through a saturated lock causes the overall application performance to fade or even drop abruptly. This problem is particularly (but not solely) acute on oversubscribed systems (systems with more threads… ▽ More

    Submitted 11 July, 2019; v1 submitted 26 May, 2019; originally announced May 2019.

  14. arXiv:1810.05600  [pdf, other

    cs.OS

    Compact NUMA-Aware Locks

    Authors: Dave Dice, Alex Kogan

    Abstract: Modern multi-socket architectures exhibit non-uniform memory access (NUMA) behavior, where access by a core to data cached locally on a socket is much faster than access to data cached on a remote socket. Prior work offers several efficient NUMA-aware locks that exploit this behavior by keeping the lock ownership on the same socket, thus reducing remote cache misses and inter-socket communication.… ▽ More

    Submitted 1 March, 2019; v1 submitted 12 October, 2018; originally announced October 2018.

    ACM Class: D.4.1; D.1.3

  15. arXiv:1810.01573  [pdf, other

    cs.OS

    TWA -- Ticket Locks Augmented with a Waiting Array

    Authors: Dave Dice, Alex Kogan

    Abstract: The classic ticket lock consists of ticket and grant fields. Arriving threads atomically fetch-and-increment ticket and then wait for grant to become equal to the value returned by the fetch-and-increment primitive, at which point the thread holds the lock. The corresponding unlock operation simply increments grant. This simple design has short code paths and fast handover (transfer of ownership)… ▽ More

    Submitted 10 July, 2019; v1 submitted 2 October, 2018; originally announced October 2018.

    ACM Class: D.1.3

  16. arXiv:1810.01553  [pdf, other

    cs.OS

    BRAVO -- Biased Locking for Reader-Writer Locks

    Authors: David Dice, Alex Kogan

    Abstract: Designers of modern reader-writer locks confront a difficult trade-off related to reader scalability. Locks that have a compact memory representation for active readers will typically suffer under high intensity read-dominated workloads when the "reader indicator"' state is updated frequently by a diverse set of threads, causing cache invalidation and coherence traffic. Other designs, such as coho… ▽ More

    Submitted 10 July, 2019; v1 submitted 2 October, 2018; originally announced October 2018.

    ACM Class: D.1.3

  17. arXiv:1603.04813  [pdf, other

    math.AG cs.SC math.AC

    Algorithm for computing $μ$-bases of univariate polynomials

    Authors: Hoon Hong, Zachary Hough, Irina A. Kogan

    Abstract: We present a new algorithm for computing a $μ$-basis of the syzygy module of $n$ polynomials in one variable over an arbitrary field $\mathbb{K}$. The algorithm is conceptually different from the previously-developed algorithms by Cox, Sederberg, Chen, Zheng, and Wang for $n=3$, and by Song and Goldman for an arbitrary $n$. It involves computing a "partial" reduced row-echelon form of a… ▽ More

    Submitted 8 March, 2017; v1 submitted 15 March, 2016; originally announced March 2016.

    Comments: 34 pages, 6 figures

    MSC Class: 12Y05; 13P10; 14Q05; 68W30

    Journal ref: J. of Symbolic Comput., Vol. 80, No 3, (2017), 844 - 874

  18. Invariants of objects and their images under surjective maps

    Authors: Irina A. Kogan, Peter J. Olver

    Abstract: We examine the relationships between the differential invariants of objects and of their images under a surjective map. We analyze both the case when the underlying transformation group is projectable and hence induces an action on the image, and the case when only a proper subgroup of the entire group acts projectably. In the former case, we establish a constructible isomorphism between the algeb… ▽ More

    Submitted 22 September, 2015; originally announced September 2015.

    Comments: This paper includes corrections and additions to the published version

    MSC Class: 53A55; 14L24; 14H50; 68T45 ACM Class: I.2.10

    Journal ref: Lobachevskii J. Math. 36 (2015), 260--285

  19. arXiv:1504.04640  [pdf, ps, other

    cs.OS

    The Influence of Malloc Placement on TSX Hardware Transactional Memory

    Authors: Dave Dice, Tim Harris, Alex Kogan, Yossi Lev

    Abstract: The hardware transactional memory (HTM) implementation in Intel's i7-4770 "Haswell" processor tracks the transactional read-set in the L1 (level-1), L2 (level-2) and L3 (level-3) caches and the write-set in the L1 cache. Displacement or eviction of read-set entries from the cache hierarchy or write-set entries from the L1 results in abort. We show that the placement policies of dynamic storage all… ▽ More

    Submitted 29 April, 2015; v1 submitted 17 April, 2015; originally announced April 2015.

    ACM Class: D.1.3

  20. arXiv:1407.6968  [pdf, other

    cs.PL

    Hardware extensions to make lazy subscription safe

    Authors: Dave Dice, Timothy L. Harris, Alex Kogan, Yossi Lev, Mark Moir

    Abstract: Transactional Lock Elision (TLE) uses Hardware Transactional Memory (HTM) to execute unmodified critical sections concurrently, even if they are protected by the same lock. To ensure correctness, the transactions used to execute these critical sections "subscribe" to the lock by reading it and checking that it is available. A recent paper proposed using the tempting "lazy subscription" optimi… ▽ More

    Submitted 23 July, 2014; originally announced July 2014.

    Comments: 6 pages, extended version of WTTM2014 paper

  21. arXiv:1303.3358  [pdf, other

    math.AG cs.CG math.DG

    Object-Image Correspondence for Algebraic Curves under Projections

    Authors: Joseph M. Burdis, Irina A. Kogan, Hoon Hong

    Abstract: We present a novel algorithm for deciding whether a given planar curve is an image of a given spatial curve, obtained by a central or a parallel projection with unknown parameters. The motivation comes from the problem of establishing a correspondence between an object and an image, taken by a camera with unknown position and parameters. A straightforward approach to this problem consists of setti… ▽ More

    Submitted 10 March, 2019; v1 submitted 14 March, 2013; originally announced March 2013.

    Comments: significantly improved version (corrected and completed) of arXiv:1202.1303; v2: Proof of Theorem 4 corrected; v3: Equation (48) corrected

    Journal ref: SIGMA 9 (2013), 023, 31 pages

  22. arXiv:1202.1303   

    math.AG cs.CG

    Object-image correspondence for curves under projections

    Authors: Joseph M. Burdis, Irina A. Kogan

    Abstract: We present a novel algorithm for deciding whether a given planar curve is an image of a given spatial curve, obtained by a central or a parallel projection with unknown parameters. A straightforward approach to this problem consists of setting up a system of conditions on the projection parameters and then checking whether or not this system has a solution. The main advantage of the algorithm pres… ▽ More

    Submitted 15 March, 2013; v1 submitted 6 February, 2012; originally announced February 2012.

    Comments: A significantly improved version of this paper (corrected and completed) has been posted arXiv:1303.3358

    MSC Class: 14H50; 14Q05; 68T45; 03C10

  23. arXiv:1004.0393  [pdf, other

    cs.CV math.AG

    Object-image correspondence for curves under finite and affine cameras

    Authors: Joseph M. Burdis, Irina A. Kogan

    Abstract: We provide criteria for deciding whether a given planar curve is an image of a given spatial curve, obtained by a central or a parallel projection with unknown parameters. These criteria reduce the projection problem to a certain modification of the equivalence problem of planar curves under affine and projective transformations. The latter problem can be addressed using Cartan's moving frame meth… ▽ More

    Submitted 28 February, 2011; v1 submitted 2 April, 2010; originally announced April 2010.

    Comments: 19 pages, 2 figures. This version considers the case of rational algebraic curves

    MSC Class: 14H50; 14Q05; 68T45 ACM Class: I.4.8

  24. arXiv:0806.1984  [pdf, other

    cs.CV

    Classification of curves in 2D and 3D via affine integral signatures

    Authors: S. Feng, I. A. Kogan, H. Krim

    Abstract: We propose a robust classification algorithm for curves in 2D and 3D, under the special and full groups of affine transformations. To each plane or spatial curve we assign a plane signature curve. Curves, equivalent under an affine transformation, have the same signature. The signatures introduced in this paper are based on integral invariants, which behave much better on noisy images than class… ▽ More

    Submitted 11 June, 2008; originally announced June 2008.

    Comments: 30 pages, 16 figures

    ACM Class: I.4