-
Ranking with Ties based on Noisy Performance Data
Authors:
Aravind Sankaran,
Lars Karlsson,
Paolo Bientinesi
Abstract:
We consider the problem of ranking a set of objects based on their performance when the measurement of said performance is subject to noise. In this scenario, the performance is measured repeatedly, resulting in a range of measurements for each object. If the ranges of two objects do not overlap, then we consider one object as 'better' than the other, and we expect it to receive a higher rank; if,…
▽ More
We consider the problem of ranking a set of objects based on their performance when the measurement of said performance is subject to noise. In this scenario, the performance is measured repeatedly, resulting in a range of measurements for each object. If the ranges of two objects do not overlap, then we consider one object as 'better' than the other, and we expect it to receive a higher rank; if, however, the ranges overlap, then the objects are incomparable, and we wish them to be assigned the same rank. Unfortunately, the incomparability relation of ranges is in general not transitive; as a consequence, in general the two requirements cannot be satisfied simultaneously, i.e., it is not possible to guarantee both distinct ranks for objects with separated ranges, and same rank for objects with overlapping ranges. This conflict leads to more than one reasonable way to rank a set of objects. In this paper, we explore the ambiguities that arise when ranking with ties, and define a set of reasonable rankings, which we call partial rankings. We develop and analyse three different methodologies to compute a partial ranking. Finally, we show how performance differences among objects can be investigated with the help of partial ranking.
△ Less
Submitted 18 June, 2024; v1 submitted 28 May, 2024;
originally announced May 2024.
-
Revisiting The Classics: A Study on Identifying and Rectifying Gender Stereotypes in Rhymes and Poems
Authors:
Aditya Narayan Sankaran,
Vigneshwaran Shankaran,
Sampath Lonka,
Rajesh Sharma
Abstract:
Rhymes and poems are a powerful medium for transmitting cultural norms and societal roles. However, the pervasive existence of gender stereotypes in these works perpetuates biased perceptions and limits the scope of individuals' identities. Past works have shown that stereotyping and prejudice emerge in early childhood, and developmental research on causal mechanisms is critical for understanding…
▽ More
Rhymes and poems are a powerful medium for transmitting cultural norms and societal roles. However, the pervasive existence of gender stereotypes in these works perpetuates biased perceptions and limits the scope of individuals' identities. Past works have shown that stereotyping and prejudice emerge in early childhood, and developmental research on causal mechanisms is critical for understanding and controlling stereotyping and prejudice. This work contributes by gathering a dataset of rhymes and poems to identify gender stereotypes and propose a model with 97% accuracy to identify gender bias. Gender stereotypes were rectified using a Large Language Model (LLM) and its effectiveness was evaluated in a comparative survey against human educator rectifications. To summarize, this work highlights the pervasive nature of gender stereotypes in literary works and reveals the potential of LLMs to rectify gender stereotypes. This study raises awareness and promotes inclusivity within artistic expressions, making a significant contribution to the discourse on gender equality.
△ Less
Submitted 25 March, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
A Test for FLOPs as a Discriminant for Linear Algebra Algorithms
Authors:
Aravind Sankaran,
Paolo Bientinesi
Abstract:
Linear algebra expressions, which play a central role in countless scientific computations, are often computed via a sequence of calls to existing libraries of building blocks (such as those provided by BLAS and LAPACK). A sequence identifies a computing strategy, i.e., an algorithm, and normally for one linear algebra expression many alternative algorithms exist. Although mathematically equivalen…
▽ More
Linear algebra expressions, which play a central role in countless scientific computations, are often computed via a sequence of calls to existing libraries of building blocks (such as those provided by BLAS and LAPACK). A sequence identifies a computing strategy, i.e., an algorithm, and normally for one linear algebra expression many alternative algorithms exist. Although mathematically equivalent, those algorithms might exhibit significant differences in terms of performance. Several high-level languages and tools for matrix computations such as Julia, Armadillo, Linnea, etc., make algorithmic choices by minimizing the number of Floating Point Operations (FLOPs). However, there can be several algorithms that share the same (or have nearly identical) number of FLOPs; in many cases, these algorithms exhibit execution times which are statistically equivalent and one could arbitrarily select one of them as the best algorithm. It is however not unlikely to find cases where the execution times are significantly different from one another (despite the FLOP count being almost the same). It is also possible that the algorithm that minimizes FLOPs is not the one that minimizes execution time. In this work, we develop a methodology to test the reliability of FLOPs as discriminant for linear algebra algorithms. Given a set of algorithms (for an instance of a linear algebra expression) as input, the methodology ranks them into performance classes; i.e., multiple algorithms are allowed to share the same rank. To this end, we measure the algorithms iteratively until the changes in the ranks converge to a value close to zero. FLOPs are a valid discriminant for an instance if all the algorithms with minimum FLOPs are assigned the best rank; otherwise, the instance is regarded as an anomaly, which can then be used in the investigation of the root cause of performance differences.
△ Less
Submitted 30 November, 2022; v1 submitted 7 September, 2022;
originally announced September 2022.
-
Benchmarking the Linear Algebra Awareness of TensorFlow and PyTorch
Authors:
Aravind Sankaran,
Navid Akbari Alashti,
Christos Psarras,
Paolo Bientinesi
Abstract:
Linear algebra operations, which are ubiquitous in machine learning, form major performance bottlenecks. The High-Performance Computing community invests significant effort in the development of architecture-specific optimized kernels, such as those provided by the BLAS and LAPACK libraries, to speed up linear algebra operations. However, end users are progressively less likely to go through the e…
▽ More
Linear algebra operations, which are ubiquitous in machine learning, form major performance bottlenecks. The High-Performance Computing community invests significant effort in the development of architecture-specific optimized kernels, such as those provided by the BLAS and LAPACK libraries, to speed up linear algebra operations. However, end users are progressively less likely to go through the error prone and time-consuming process of directly using said kernels; instead, frameworks such as TensorFlow (TF) and PyTorch (PyT), which facilitate the development of machine learning applications, are becoming more and more popular. Although such frameworks link to BLAS and LAPACK, it is not clear whether or not they make use of linear algebra knowledge to speed up computations. For this reason, in this paper we develop benchmarks to investigate the linear algebra optimization capabilities of TF and PyT. Our analyses reveal that a number of linear algebra optimizations are still missing; for instance, reducing the number of scalar operations by applying the distributive law, and automatically identifying the optimal parenthesization of a matrix chain. In this work, we focus on linear algebra computations in TF and PyT; we both expose opportunities for performance enhancement to the benefit of the developers of the frameworks and provide end users with guidelines on how to achieve performance gains.
△ Less
Submitted 20 February, 2022;
originally announced February 2022.
-
Pseudo-finiteness of arbitrary graphs of bounded shrub-depth
Authors:
Abhisekh Sankaran
Abstract:
We consider classes of arbitrary (finite or infinite) graphs of bounded shrub-depth, specifically the classes $\mathrm{TM}_r(d)$ of arbitrary graphs that have tree models of height $d$ and $r$ labels. We show that the graphs of $\mathrm{TM}_r(d)$ are $\mathrm{MSO}$-pseudo-finite relative to the class $\mathrm{TM}^{\text{f}}_r(d)$ of finite graphs of $\mathrm{TM}_r(d)$; that is, that every…
▽ More
We consider classes of arbitrary (finite or infinite) graphs of bounded shrub-depth, specifically the classes $\mathrm{TM}_r(d)$ of arbitrary graphs that have tree models of height $d$ and $r$ labels. We show that the graphs of $\mathrm{TM}_r(d)$ are $\mathrm{MSO}$-pseudo-finite relative to the class $\mathrm{TM}^{\text{f}}_r(d)$ of finite graphs of $\mathrm{TM}_r(d)$; that is, that every $\mathrm{MSO}$ sentence true in a graph of $\mathrm{TM}_r(d)$ is also true in a graph of $\mathrm{TM}^{\text{f}}_r(d)$. We also show that $\mathrm{TM}_r(d)$ is closed under ultraproducts and ultraroots. These results have two consequences. The first is that the index of the $\mathrm{MSO}[m]$-equivalence relation on graphs of $\mathrm{TM}_r(d)$ is bounded by a $(d+1)$-fold exponential in $m$. The second is that $\mathrm{TM}_r(d)$ is exactly the class of all graphs that are $\mathrm{MSO}$-pseudo-finite relative to $\mathrm{TM}^{\text{f}}_r(d)$.
△ Less
Submitted 13 February, 2022;
originally announced February 2022.
-
Feferman-Vaught Decompositions for Prefix Classes of First Order Logic
Authors:
Abhisekh Sankaran
Abstract:
The Feferman-Vaught theorem provides a way of evaluating a first order sentence $\varphi$ on a disjoint union of structures by producing a decomposition of $\varphi$ into sentences which can be evaluated on the individual structures and the results of these evaluations combined using a propositional formula. This decomposition can in general be non-elementarily larger than $\varphi$. We show that…
▽ More
The Feferman-Vaught theorem provides a way of evaluating a first order sentence $\varphi$ on a disjoint union of structures by producing a decomposition of $\varphi$ into sentences which can be evaluated on the individual structures and the results of these evaluations combined using a propositional formula. This decomposition can in general be non-elementarily larger than $\varphi$. We show that for first order sentences in prenex normal form with a fixed number of quantifier alternations, such a decomposition, further with the same number of quantifier alternations, can be obtained in time elementary in the size of $\varphi$. We obtain this result as a consequence of a more general decomposition theorem that we prove for a family of infinitary logics we define. We extend these results by considering binary operations other than disjoint union, in particular sum-like operations such as ordered sum and NLC-sum, that are definable using quantifier-free interpretations.
△ Less
Submitted 30 December, 2021;
originally announced December 2021.
-
On Causal Inference for Data-free Structured Pruning
Authors:
Martin Ferianc,
Anush Sankaran,
Olivier Mastropietro,
Ehsan Saboori,
Quentin Cappart
Abstract:
Neural networks (NNs) are making a large impact both on research and industry. Nevertheless, as NNs' accuracy increases, it is followed by an expansion in their size, required number of compute operations and energy consumption. Increase in resource consumption results in NNs' reduced adoption rate and real-world deployment impracticality. Therefore, NNs need to be compressed to make them availabl…
▽ More
Neural networks (NNs) are making a large impact both on research and industry. Nevertheless, as NNs' accuracy increases, it is followed by an expansion in their size, required number of compute operations and energy consumption. Increase in resource consumption results in NNs' reduced adoption rate and real-world deployment impracticality. Therefore, NNs need to be compressed to make them available to a wider audience and at the same time decrease their runtime costs. In this work, we approach this challenge from a causal inference perspective, and we propose a scoring mechanism to facilitate structured pruning of NNs. The approach is based on measuring mutual information under a maximum entropy perturbation, sequentially propagated through the NN. We demonstrate the method's performance on two datasets and various NNs' sizes, and we show that our approach achieves competitive performance under challenging conditions.
△ Less
Submitted 19 December, 2021;
originally announced December 2021.
-
Performance Comparison for Scientific Computations on the Edge via Relative Performance
Authors:
Aravind Sankaran,
Paolo Bientinesi
Abstract:
In a typical Internet-of-Things setting that involves scientific applications, a target computation can be evaluated in many different ways depending on the split of computations among various devices. On the one hand, different implementations (or algorithms)--equivalent from a mathematical perspective--might exhibit significant difference in terms of performance. On the other hand, some of the i…
▽ More
In a typical Internet-of-Things setting that involves scientific applications, a target computation can be evaluated in many different ways depending on the split of computations among various devices. On the one hand, different implementations (or algorithms)--equivalent from a mathematical perspective--might exhibit significant difference in terms of performance. On the other hand, some of the implementations are likely to show similar performance characteristics. In this paper, we focus on analyzing the performance of a given set of algorithms by clustering them into performance classes. To this end, we use a measurement-based approach to evaluate and score algorithms based on pair-wise comparisons; we refer to this approach as"Relative performance analysis". Each comparison yields one of three outcomes: one algorithm can be "better", "worse", or "equivalent" to another; those algorithms evaluating to have equivalent performance are merged into the same performance class. We show that our clustering methodology facilitates algorithm selection with respect to more than one metric; for instance, from the subset of equivalently fast algorithms, one could then select an algorithm that consumes the least energy on a certain device.
△ Less
Submitted 3 March, 2021; v1 submitted 25 February, 2021;
originally announced February 2021.
-
Deeplite Neutrino: An End-to-End Framework for Constrained Deep Learning Model Optimization
Authors:
Anush Sankaran,
Olivier Mastropietro,
Ehsan Saboori,
Yasser Idris,
Davis Sawyer,
MohammadHossein AskariHemmat,
Ghouthi Boukli Hacene
Abstract:
Designing deep learning-based solutions is becoming a race for training deeper models with a greater number of layers. While a large-size deeper model could provide competitive accuracy, it creates a lot of logistical challenges and unreasonable resource requirements during development and deployment. This has been one of the key reasons for deep learning models not being excessively used in vario…
▽ More
Designing deep learning-based solutions is becoming a race for training deeper models with a greater number of layers. While a large-size deeper model could provide competitive accuracy, it creates a lot of logistical challenges and unreasonable resource requirements during development and deployment. This has been one of the key reasons for deep learning models not being excessively used in various production environments, especially in edge devices. There is an immediate requirement for optimizing and compressing these deep learning models, to enable on-device intelligence. In this research, we introduce a black-box framework, Deeplite Neutrino for production-ready optimization of deep learning models. The framework provides an easy mechanism for the end-users to provide constraints such as a tolerable drop in accuracy or target size of the optimized models, to guide the whole optimization process. The framework is easy to include in an existing production pipeline and is available as a Python Package, supporting PyTorch and Tensorflow libraries. The optimization performance of the framework is shown across multiple benchmark datasets and popular deep learning models. Further, the framework is currently used in production and the results and testimonials from several clients are summarized.
△ Less
Submitted 13 January, 2021; v1 submitted 11 January, 2021;
originally announced January 2021.
-
MSO Undecidability for Hereditary Classes of Unbounded Clique-Width
Authors:
Anuj Dawar,
Abhisekh Sankaran
Abstract:
Seese's conjecture for finite graphs states that monadic second-order logic (MSO) is undecidable on all graph classes of unbounded clique-width. We show that to establish this it would suffice to show that grids of unbounded size can be interpreted in two families of graph classes: minimal hereditary classes of unbounded clique-width; and antichains of unbounded clique-width under the induced subg…
▽ More
Seese's conjecture for finite graphs states that monadic second-order logic (MSO) is undecidable on all graph classes of unbounded clique-width. We show that to establish this it would suffice to show that grids of unbounded size can be interpreted in two families of graph classes: minimal hereditary classes of unbounded clique-width; and antichains of unbounded clique-width under the induced subgraph relation. We explore all the currently known classes of the former category and establish that grids of unbounded size can indeed be interpreted in them.
△ Less
Submitted 3 August, 2023; v1 submitted 5 November, 2020;
originally announced November 2020.
-
Discriminating Equivalent Algorithms via Relative Performance
Authors:
Aravind Sankaran,
Paolo Bientinesi
Abstract:
In scientific computing, it is common that a mathematical expression can be computed by many different algorithms (sometimes over hundreds), each identifying a specific sequence of library calls. Although mathematically equivalent, those algorithms might exhibit significant differences in terms of performance. However in practice, due to fluctuations, there is not one algorithm that consistently p…
▽ More
In scientific computing, it is common that a mathematical expression can be computed by many different algorithms (sometimes over hundreds), each identifying a specific sequence of library calls. Although mathematically equivalent, those algorithms might exhibit significant differences in terms of performance. However in practice, due to fluctuations, there is not one algorithm that consistently performs noticeably better than the rest. For this reason, with this work we aim to identify not the one best algorithm, but the subset of algorithms that are reliably faster than the rest. To this end, instead of using the usual approach of quantifying the performance of an algorithm in absolute terms, we present a measurement-based clustering approach to sort the algorithms into equivalence (or performance) classes using pair-wise comparisons. We show that this approach, based on relative performance, leads to robust identification of the fastest algorithms even under noisy system conditions. Furthermore, it enables the development of practical machine learning models for automatic algorithm selection.
△ Less
Submitted 14 September, 2021; v1 submitted 14 October, 2020;
originally announced October 2020.
-
Some classical model theoretic aspects of bounded shrub-depth classes
Authors:
Abhisekh Sankaran
Abstract:
We consider classes of arbitrary (finite or infinite) graphs of bounded shrub-depth, specifically the class $\mathrm{TM}_{r, p}(d)$ of $p$-labeled arbitrary graphs whose underlying unlabeled graphs have tree models of height $d$ and $r$ labels. We show that this class satisfies an extension of the classical Löwenheim-Skolem property into the finite and for $\mathrm{MSO}$. This extension being a ge…
▽ More
We consider classes of arbitrary (finite or infinite) graphs of bounded shrub-depth, specifically the class $\mathrm{TM}_{r, p}(d)$ of $p$-labeled arbitrary graphs whose underlying unlabeled graphs have tree models of height $d$ and $r$ labels. We show that this class satisfies an extension of the classical Löwenheim-Skolem property into the finite and for $\mathrm{MSO}$. This extension being a generalization of the small model property, we obtain that the graphs of $\mathrm{TM}_{r, p}(d)$ are pseudo-finite. In addition, we obtain as consequences entirely new proofs of a number of known results concerning bounded shrub-depth classes (of finite graphs) and $\mathrm{TM}_{r, p}(d)$. These include the small model property for $\mathrm{MSO}$ with elementary bounds, the classical compactness theorem from model theory over $\mathrm{TM}_{r, p}(d)$, and the equivalence of $\mathrm{MSO}$ and $\mathrm{FO}$ over $\mathrm{TM}_{r, p}(d)$ and hence over bounded shrub-depth classes. The proof for the last of these is via an adaptation of the proof of the classical Lindström's theorem characterizing $\mathrm{FO}$ over arbitrary structures.
△ Less
Submitted 12 October, 2020;
originally announced October 2020.
-
Extension Preservation in the Finite and Prefix Classes of First Order Logic
Authors:
Anuj Dawar,
Abhisekh Sankaran
Abstract:
It is well known that the classic Łoś-Tarski preservation theorem fails in the finite: there are first-order definable classes of finite structures closed under extensions which are not definable (in the finite) in the existential fragment of first-order logic. We strengthen this by constructing for every $n$, first-order definable classes of finite structures closed under extensions which are not…
▽ More
It is well known that the classic Łoś-Tarski preservation theorem fails in the finite: there are first-order definable classes of finite structures closed under extensions which are not definable (in the finite) in the existential fragment of first-order logic. We strengthen this by constructing for every $n$, first-order definable classes of finite structures closed under extensions which are not definable with $n$ quantifier alternations. The classes we construct are definable in the extension of Datalog with negation and indeed in the existential fragment of transitive-closure logic. This answers negatively an open question posed by Rosen and Weinstein.
△ Less
Submitted 24 October, 2020; v1 submitted 10 July, 2020;
originally announced July 2020.
-
Reducing Overlearning through Disentangled Representations by Suppressing Unknown Tasks
Authors:
Naveen Panwar,
Tarun Tater,
Anush Sankaran,
Senthil Mani
Abstract:
Existing deep learning approaches for learning visual features tend to overlearn and extract more information than what is required for the task at hand. From a privacy preservation perspective, the input visual information is not protected from the model; enabling the model to become more intelligent than it is trained to be. Current approaches for suppressing additional task learning assume the…
▽ More
Existing deep learning approaches for learning visual features tend to overlearn and extract more information than what is required for the task at hand. From a privacy preservation perspective, the input visual information is not protected from the model; enabling the model to become more intelligent than it is trained to be. Current approaches for suppressing additional task learning assume the presence of ground truth labels for the tasks to be suppressed during training time. In this research, we propose a three-fold novel contribution: (i) a model-agnostic solution for reducing model overlearning by suppressing all the unknown tasks, (ii) a novel metric to measure the trust score of a trained deep learning model, and (iii) a simulated benchmark dataset, PreserveTask, having five different fundamental image classification tasks to study the generalization nature of models. In the first set of experiments, we learn disentangled representations and suppress overlearning of five popular deep learning models: VGG16, VGG19, Inception-v1, MobileNet, and DenseNet on PreserverTask dataset. Additionally, we show results of our framework on color-MNIST dataset and practical applications of face attribute preservation in Diversity in Faces (DiF) and IMDB-Wiki dataset.
△ Less
Submitted 20 May, 2020;
originally announced May 2020.
-
Clique-Width of Point Configurations
Authors:
Onur Çağırıcı,
Petr Hliněný,
Filip Pokrývka,
Abhisekh Sankaran
Abstract:
While structural width parameters (of the input) belong to the standard toolbox of graph algorithms, it is not the usual case in computational geometry. As a case study we propose a natural extension of the structural graph parameter of clique-width to geometric point configurations represented by their order type. We study basic properties of this clique-width notion, and relate it to the monadic…
▽ More
While structural width parameters (of the input) belong to the standard toolbox of graph algorithms, it is not the usual case in computational geometry. As a case study we propose a natural extension of the structural graph parameter of clique-width to geometric point configurations represented by their order type. We study basic properties of this clique-width notion, and relate it to the monadic second-order logic of point configurations. As an application, we provide several linear FPT time algorithms for geometric point problems which are NP-hard in general, in the special case that the input point set is of bounded clique-width and the clique-width expression is also given.
△ Less
Submitted 5 April, 2020;
originally announced April 2020.
-
AuthorGAN: Improving GAN Reproducibility using a Modular GAN Framework
Authors:
Raunak Sinha,
Anush Sankaran,
Mayank Vatsa,
Richa Singh
Abstract:
Generative models are becoming increasingly popular in the literature, with Generative Adversarial Networks (GAN) being the most successful variant, yet. With this increasing demand and popularity, it is becoming equally difficult and challenging to implement and consume GAN models. A qualitative user survey conducted across 47 practitioners show that expert level skill is required to use GAN mode…
▽ More
Generative models are becoming increasingly popular in the literature, with Generative Adversarial Networks (GAN) being the most successful variant, yet. With this increasing demand and popularity, it is becoming equally difficult and challenging to implement and consume GAN models. A qualitative user survey conducted across 47 practitioners show that expert level skill is required to use GAN model for a given task, despite the presence of various open source libraries. In this research, we propose a novel system called AuthorGAN, aiming to achieve true democratization of GAN authoring. A highly modularized library agnostic representation of GAN model is defined to enable interoperability of GAN architecture across different libraries such as Keras, Tensorflow, and PyTorch. An intuitive drag-and-drop based visual designer is built using node-red platform to enable custom architecture designing without the need for writing any code. Five different GAN models are implemented as a part of this framework and the performance of the different GAN models are shown using the benchmark MNIST dataset.
△ Less
Submitted 26 November, 2019;
originally announced November 2019.
-
"You might also like this model": Data Driven Approach for Recommending Deep Learning Models for Unknown Image Datasets
Authors:
Ameya Prabhu,
Riddhiman Dasgupta,
Anush Sankaran,
Srikanth Tamilselvam,
Senthil Mani
Abstract:
For an unknown (new) classification dataset, choosing an appropriate deep learning architecture is often a recursive, time-taking, and laborious process. In this research, we propose a novel technique to recommend a suitable architecture from a repository of known models. Further, we predict the performance accuracy of the recommended architecture on the given unknown dataset, without the need for…
▽ More
For an unknown (new) classification dataset, choosing an appropriate deep learning architecture is often a recursive, time-taking, and laborious process. In this research, we propose a novel technique to recommend a suitable architecture from a repository of known models. Further, we predict the performance accuracy of the recommended architecture on the given unknown dataset, without the need for training the model. We propose a model encoder approach to learn a fixed length representation of deep learning architectures along with its hyperparameters, in an unsupervised fashion. We manually curate a repository of image datasets with corresponding known deep learning models and show that the predicted accuracy is a good estimator of the actual accuracy. We discuss the implications of the proposed approach for three benchmark images datasets and also the challenges in using the approach for text modality. To further increase the reproducibility of the proposed approach, the entire implementation is made publicly available along with the trained models.
△ Less
Submitted 20 May, 2020; v1 submitted 26 November, 2019;
originally announced November 2019.
-
Coverage Testing of Deep Learning Models using Dataset Characterization
Authors:
Senthil Mani,
Anush Sankaran,
Srikanth Tamilselvam,
Akshay Sethi
Abstract:
Deep Neural Networks (DNNs), with its promising performance, are being increasingly used in safety critical applications such as autonomous driving, cancer detection, and secure authentication. With growing importance in deep learning, there is a requirement for a more standardized framework to evaluate and test deep learning models. The primary challenge involved in automated generation of extens…
▽ More
Deep Neural Networks (DNNs), with its promising performance, are being increasingly used in safety critical applications such as autonomous driving, cancer detection, and secure authentication. With growing importance in deep learning, there is a requirement for a more standardized framework to evaluate and test deep learning models. The primary challenge involved in automated generation of extensive test cases are: (i) neural networks are difficult to interpret and debug and (ii) availability of human annotators to generate specialized test points. In this research, we explain the necessity to measure the quality of a dataset and propose a test case generation system guided by the dataset properties. From a testing perspective, four different dataset quality dimensions are proposed: (i) equivalence partitioning, (ii) centroid positioning, (iii) boundary conditioning, and (iv) pair-wise boundary conditioning. The proposed system is evaluated on well known image classification datasets such as MNIST, Fashion-MNIST, CIFAR10, CIFAR100, and SVHN against popular deep learning models such as LeNet, ResNet-20, VGG-19. Further, we conduct various experiments to demonstrate the effectiveness of systematic test case generation system for evaluating deep learning models.
△ Less
Submitted 17 November, 2019;
originally announced November 2019.
-
Multifractal Description of Streamflow and Suspended Sediment Concentration Data from Indian River Basins
Authors:
Adarsh Sankaran,
Drisya Sasi Dharan,
Anand Vishnu Babykuttan,
Nandhu Ambika Raju,
Vysakh Kunju Kunju,
Marcin Wątorek
Abstract:
This study investigates the multifractality of streamflow data of 192 stations located in 13 river basins in India using the Multifractal Detrended Fluctuation Analysis (MF-DFA). The streamflow datasets of different river basins displayed multifractality and long term persistence with a mean exponent of 0.585. The streamflow records of Krishna basin displayed least persistence and that of Godavari…
▽ More
This study investigates the multifractality of streamflow data of 192 stations located in 13 river basins in India using the Multifractal Detrended Fluctuation Analysis (MF-DFA). The streamflow datasets of different river basins displayed multifractality and long term persistence with a mean exponent of 0.585. The streamflow records of Krishna basin displayed least persistence and that of Godavari basin displayed strongest multifractality and complexity. Subsequently, the streamflow-sediment links of five major river basins are evaluated using the novel Multifractal Cross Correlation Analysis (MFCCA) method of cross correlation studies. The results showed that the joint persistence of streamflow and total suspended sediments (TSS) is approximately the mean of the persistence of individual series. The streamflow displayed higher persistence than TSS in 60 % of the stations while in majority of stations of Godavari basin the trend was opposite. The annual cross correlation is higher than seasonal cross correlation in majority of stations but at these time scales strength of their association differs with river basin.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
Exact Crossing Number Parameterized by Vertex Cover
Authors:
Petr Hliněný,
Abhisekh Sankaran
Abstract:
We prove that the exact crossing number of a graph can be efficiently computed for simple graphs having bounded vertex cover. In more precise words, Crossing Number is in FPT when parameterized by the vertex cover size. This is a notable advance since we know only very few nontrivial examples of graph classes with unbounded and yet efficiently computable crossing number. Our result can be viewed a…
▽ More
We prove that the exact crossing number of a graph can be efficiently computed for simple graphs having bounded vertex cover. In more precise words, Crossing Number is in FPT when parameterized by the vertex cover size. This is a notable advance since we know only very few nontrivial examples of graph classes with unbounded and yet efficiently computable crossing number. Our result can be viewed as a strengthening of a previous result of Lokshtanov [arXiv, 2015] that Optimal Linear Arrangement is in FPT when parameterized by the vertex cover size, and we use a similar approach of reducing the problem to a tractable instance of Integer Quadratic Programming as in Lokshtanov's paper.
△ Less
Submitted 5 September, 2019; v1 submitted 14 June, 2019;
originally announced June 2019.
-
A Visual Programming Paradigm for Abstract Deep Learning Model Development
Authors:
Srikanth Tamilselvam,
Naveen Panwar,
Shreya Khare,
Rahul Aralikatte,
Anush Sankaran,
Senthil Mani
Abstract:
Deep learning is one of the fastest growing technologies in computer science with a plethora of applications. But this unprecedented growth has so far been limited to the consumption of deep learning experts. The primary challenge being a steep learning curve for learning the programming libraries and the lack of intuitive systems enabling non-experts to consume deep learning. Towards this goal, w…
▽ More
Deep learning is one of the fastest growing technologies in computer science with a plethora of applications. But this unprecedented growth has so far been limited to the consumption of deep learning experts. The primary challenge being a steep learning curve for learning the programming libraries and the lack of intuitive systems enabling non-experts to consume deep learning. Towards this goal, we study the effectiveness of a no-code paradigm for designing deep learning models. Particularly, a visual drag-and-drop interface is found more efficient when compared with the traditional programming and alternative visual programming paradigms. We conduct user studies of different expertise levels to measure the entry level barrier and the developer load across different programming paradigms. We obtain a System Usability Scale (SUS) of 90 and a NASA Task Load index (TLX) score of 21 for the proposed visual programming compared to 68 and 52, respectively, for the traditional programming methods.
△ Less
Submitted 19 August, 2019; v1 submitted 7 May, 2019;
originally announced May 2019.
-
On Matching Faces with Alterations due to Plastic Surgery and Disguise
Authors:
Saksham Suri,
Anush Sankaran,
Mayank Vatsa,
Richa Singh
Abstract:
Plastic surgery and disguise variations are two of the most challenging co-variates of face recognition. The state-of-art deep learning models are not sufficiently successful due to the availability of limited training samples. In this paper, a novel framework is proposed which transfers fundamental visual features learnt from a generic image dataset to supplement a supervised face recognition mod…
▽ More
Plastic surgery and disguise variations are two of the most challenging co-variates of face recognition. The state-of-art deep learning models are not sufficiently successful due to the availability of limited training samples. In this paper, a novel framework is proposed which transfers fundamental visual features learnt from a generic image dataset to supplement a supervised face recognition model. The proposed algorithm combines off-the-shelf supervised classifier and a generic, task independent network which encodes information related to basic visual cues such as color, shape, and texture. Experiments are performed on IIITD plastic surgery face dataset and Disguised Faces in the Wild (DFW) dataset. Results showcase that the proposed algorithm achieves state of the art results on both the datasets. Specifically on the DFW database, the proposed algorithm yields over 87% verification accuracy at 1% false accept rate which is 53.8% better than baseline results computed using VGGFace.
△ Less
Submitted 18 November, 2018;
originally announced November 2018.
-
Revisiting the generalized Łoś-Tarski theorem
Authors:
Abhisekh Sankaran
Abstract:
We present a new proof of the generalized Łoś-Tarski theorem ($\mathsf{GLT}(k)$) introduced in [1], over arbitrary structures. Instead of using $λ$-saturation as in [1], we construct just the "required saturation" directly using ascending chains of structures. We also strengthen the failure of $\mathsf{GLT}(k)$ in the finite shown in [2], by strengthening the failure of the Łoś-Tarski theorem in t…
▽ More
We present a new proof of the generalized Łoś-Tarski theorem ($\mathsf{GLT}(k)$) introduced in [1], over arbitrary structures. Instead of using $λ$-saturation as in [1], we construct just the "required saturation" directly using ascending chains of structures. We also strengthen the failure of $\mathsf{GLT}(k)$ in the finite shown in [2], by strengthening the failure of the Łoś-Tarski theorem in this context. In particular, we prove that not just universal sentences, but for each fixed $k$, even $Σ^0_2$ sentences containing $k$ existential quantifiers fail to capture hereditariness in the finite. We conclude with two problems as future directions, concerning the Łoś-Tarski theorem and $\mathsf{GLT}(k)$, both in the context of all finite structures.
[1] 10.1016/j.apal.2015.11.001 ; [2] 10.1007/978-3-642-32621-9\_22
△ Less
Submitted 15 November, 2018;
originally announced November 2018.
-
Explaining Deep Learning Models using Causal Inference
Authors:
Tanmayee Narendra,
Anush Sankaran,
Deepak Vijaykeerthy,
Senthil Mani
Abstract:
Although deep learning models have been successfully applied to a variety of tasks, due to the millions of parameters, they are becoming increasingly opaque and complex. In order to establish trust for their widespread commercial use, it is important to formalize a principled framework to reason over these models. In this work, we use ideas from causal inference to describe a general framework to…
▽ More
Although deep learning models have been successfully applied to a variety of tasks, due to the millions of parameters, they are becoming increasingly opaque and complex. In order to establish trust for their widespread commercial use, it is important to formalize a principled framework to reason over these models. In this work, we use ideas from causal inference to describe a general framework to reason over CNN models. Specifically, we build a Structural Causal Model (SCM) as an abstraction over a specific aspect of the CNN. We also formulate a method to quantitatively rank the filters of a convolution layer according to their counterfactual importance. We illustrate our approach with popular CNN architectures such as LeNet5, VGG19, and ResNet32.
△ Less
Submitted 11 November, 2018;
originally announced November 2018.
-
A Generalization of the Łoś-Tarski Preservation Theorem - Dissertation Summary
Authors:
Abhisekh Sankaran
Abstract:
This article gives a summary of the author's Ph.D. dissertation (arXiv:1609.06297). In addition to an overview of notions and results, it also provides sketches of various proofs and simplified presentations of certain abstract results of the dissertation, that concern tree representations of structures. Further, some extensions of the dissertation results are presented. These include the connecti…
▽ More
This article gives a summary of the author's Ph.D. dissertation (arXiv:1609.06297). In addition to an overview of notions and results, it also provides sketches of various proofs and simplified presentations of certain abstract results of the dissertation, that concern tree representations of structures. Further, some extensions of the dissertation results are presented. These include the connections of the model-theoretic notions introduced in the thesis with fixed parameter tractability and notions in the structure theory of sparse graph classes. The constructive aspects of the proofs of the model-theoretic results of the dissertation are used to obtain (algorithmic) meta-kernels for various dense graphs such as graphs of bounded clique-width and subclasses of these like $m$-partite cographs and graph classes of bounded shrub-depth. Finally, the article presents updated definitions and results concerning the notion of logical fractals which is a generalization of the Equivalent Bounded Substructure Property from the dissertation. In particular, our results show that (natural finitary adaptations of) both the upward and downward versions of the Löwenheim-Skolem theorem from classical model theory can be recovered in a variety of algorithmically interesting settings, and further in most cases, in effective form and even for logics beyond first order logic.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
DeepTriage: Exploring the Effectiveness of Deep Learning for Bug Triaging
Authors:
Senthil Mani,
Anush Sankaran,
Rahul Aralikatte
Abstract:
For a given software bug report, identifying an appropriate developer who could potentially fix the bug is the primary task of a bug triaging process. A bug title (summary) and a detailed description is present in most of the bug tracking systems. Automatic bug triaging algorithm can be formulated as a classification problem, with the bug title and description as the input, mapping it to one of th…
▽ More
For a given software bug report, identifying an appropriate developer who could potentially fix the bug is the primary task of a bug triaging process. A bug title (summary) and a detailed description is present in most of the bug tracking systems. Automatic bug triaging algorithm can be formulated as a classification problem, with the bug title and description as the input, mapping it to one of the available developers (classes). The major challenge is that the bug description usually contains a combination of free unstructured text, code snippets, and stack trace making the input data noisy. The existing bag-of-words (BOW) feature models do not consider the syntactical and sequential word information available in the unstructured text. We propose a novel bug report representation algorithm using an attention based deep bidirectional recurrent neural network (DBRNN-A) model that learns a syntactic and semantic feature from long word sequences in an unsupervised manner. Instead of BOW features, the DBRNN-A based bug representation is then used for training the classifier. Using an attention mechanism enables the model to learn the context representation over a long word sequence, as in a bug report. To provide a large amount of data to learn the feature learning model, the unfixed bug reports (~70% bugs in an open source bug tracking system) are leveraged, which were completely ignored in the previous studies. Another contribution is to make this research reproducible by making the source code available and creating a public benchmark dataset of bug reports from three open source bug tracking system: Google Chromium (383,104 bug reports), Mozilla Core (314,388 bug reports), and Mozilla Firefox (162,307 bug reports). Experimentally we compare our approach with BOW model and machine learning approaches and observe that DBRNN-A provides a higher rank-10 average accuracy.
△ Less
Submitted 4 January, 2018;
originally announced January 2018.
-
Sanskrit Sandhi Splitting using seq2(seq)^2
Authors:
Rahul Aralikatte,
Neelamadhav Gantayat,
Naveen Panwar,
Anush Sankaran,
Senthil Mani
Abstract:
In Sanskrit, small words (morphemes) are combined to form compound words through a process known as Sandhi. Sandhi splitting is the process of splitting a given compound word into its constituent morphemes. Although rules governing word splitting exists in the language, it is highly challenging to identify the location of the splits in a compound word. Though existing Sandhi splitting systems inco…
▽ More
In Sanskrit, small words (morphemes) are combined to form compound words through a process known as Sandhi. Sandhi splitting is the process of splitting a given compound word into its constituent morphemes. Although rules governing word splitting exists in the language, it is highly challenging to identify the location of the splits in a compound word. Though existing Sandhi splitting systems incorporate these pre-defined splitting rules, they have a low accuracy as the same compound word might be broken down in multiple ways to provide syntactically correct splits.
In this research, we propose a novel deep learning architecture called Double Decoder RNN (DD-RNN), which (i) predicts the location of the split(s) with 95% accuracy, and (ii) predicts the constituent words (learning the Sandhi splitting rules) with 79.5% accuracy, outperforming the state-of-art by 20%. Additionally, we show the generalization capability of our deep learning model, by showing competitive results in the problem of Chinese word segmentation, as well.
△ Less
Submitted 15 July, 2019; v1 submitted 1 January, 2018;
originally announced January 2018.
-
DLPaper2Code: Auto-generation of Code from Deep Learning Research Papers
Authors:
Akshay Sethi,
Anush Sankaran,
Naveen Panwar,
Shreya Khare,
Senthil Mani
Abstract:
With an abundance of research papers in deep learning, reproducibility or adoption of the existing works becomes a challenge. This is due to the lack of open source implementations provided by the authors. Further, re-implementing research papers in a different library is a daunting task. To address these challenges, we propose a novel extensible approach, DLPaper2Code, to extract and understand d…
▽ More
With an abundance of research papers in deep learning, reproducibility or adoption of the existing works becomes a challenge. This is due to the lack of open source implementations provided by the authors. Further, re-implementing research papers in a different library is a daunting task. To address these challenges, we propose a novel extensible approach, DLPaper2Code, to extract and understand deep learning design flow diagrams and tables available in a research paper and convert them to an abstract computational graph. The extracted computational graph is then converted into execution ready source code in both Keras and Caffe, in real-time. An arXiv-like website is created where the automatically generated designs is made publicly available for 5,000 research papers. The generated designs could be rated and edited using an intuitive drag-and-drop UI framework in a crowdsourced manner. To evaluate our approach, we create a simulated dataset with over 216,000 valid design visualizations using a manually defined grammar. Experiments on the simulated dataset show that the proposed framework provide more than $93\%$ accuracy in flow diagram content extraction.
△ Less
Submitted 9 November, 2017;
originally announced November 2017.
-
Hi, how can I help you?: Automating enterprise IT support help desks
Authors:
Senthil Mani,
Neelamadhav Gantayat,
Rahul Aralikatte,
Monika Gupta,
Sampath Dechu,
Anush Sankaran,
Shreya Khare,
Barry Mitchell,
Hemamalini Subramanian,
Hema Venkatarangan
Abstract:
Question answering is one of the primary challenges of natural language understanding. In realizing such a system, providing complex long answers to questions is a challenging task as opposed to factoid answering as the former needs context disambiguation. The different methods explored in the literature can be broadly classified into three categories namely: 1) classification based, 2) knowledge…
▽ More
Question answering is one of the primary challenges of natural language understanding. In realizing such a system, providing complex long answers to questions is a challenging task as opposed to factoid answering as the former needs context disambiguation. The different methods explored in the literature can be broadly classified into three categories namely: 1) classification based, 2) knowledge graph based and 3) retrieval based. Individually, none of them address the need of an enterprise wide assistance system for an IT support and maintenance domain. In this domain the variance of answers is large ranging from factoid to structured operating procedures; the knowledge is present across heterogeneous data sources like application specific documentation, ticket management systems and any single technique for a general purpose assistance is unable to scale for such a landscape. To address this, we have built a cognitive platform with capabilities adopted for this domain. Further, we have built a general purpose question answering system leveraging the platform that can be instantiated for multiple products, technologies in the support domain. The system uses a novel hybrid answering model that orchestrates across a deep learning classifier, a knowledge graph based context disambiguation module and a sophisticated bag-of-words search system. This orchestration performs context switching for a provided question and also does a smooth hand-off of the question to a human expert if none of the automated techniques can provide a confident answer. This system has been deployed across 675 internal enterprise IT support and maintenance projects.
△ Less
Submitted 2 November, 2017;
originally announced November 2017.
-
"Let me convince you to buy my product ... ": A Case Study of an Automated Persuasive System for Fashion Products
Authors:
Vitobha Munigala,
Srikanth Tamilselvam,
Anush Sankaran
Abstract:
Persuasivenes is a creative art aimed at making people believe in certain set of beliefs. Many a times, such creativity is about adapting richness of one domain into another to strike a chord with the target audience. In this research, we present PersuAIDE! - A persuasive system based on linguistic creativity to transform given sentence to generate various forms of persuading sentences. These vari…
▽ More
Persuasivenes is a creative art aimed at making people believe in certain set of beliefs. Many a times, such creativity is about adapting richness of one domain into another to strike a chord with the target audience. In this research, we present PersuAIDE! - A persuasive system based on linguistic creativity to transform given sentence to generate various forms of persuading sentences. These various forms cover multiple focus of persuasion such as memorability and sentiment. For a given simple product line, the algorithm is composed of several steps including: (i) select an appropriate well-known expression for the target domain to add memorability, (ii) identify keywords and entities in the given sentence and expression and transform it to produce creative persuading sentence, and (iii) adding positive or negative sentiment for further persuasion. The persuasive conversion were manually verified using qualitative results and the effectiveness of the proposed approach is empirically discussed.
△ Less
Submitted 25 September, 2017;
originally announced September 2017.
-
mAnI: Movie Amalgamation using Neural Imitation
Authors:
Naveen Panwar,
Shreya Khare,
Neelamadhav Gantayat,
Rahul Aralikatte,
Senthil Mani,
Anush Sankaran
Abstract:
Cross-modal data retrieval has been the basis of various creative tasks performed by Artificial Intelligence (AI). One such highly challenging task for AI is to convert a book into its corresponding movie, which most of the creative film makers do as of today. In this research, we take the first step towards it by visualizing the content of a book using its corresponding movie visuals. Given a set…
▽ More
Cross-modal data retrieval has been the basis of various creative tasks performed by Artificial Intelligence (AI). One such highly challenging task for AI is to convert a book into its corresponding movie, which most of the creative film makers do as of today. In this research, we take the first step towards it by visualizing the content of a book using its corresponding movie visuals. Given a set of sentences from a book or even a fan-fiction written in the same universe, we employ deep learning models to visualize the input by stitching together relevant frames from the movie. We studied and compared three different types of setting to match the book with the movie content: (i) Dialog model: using only the dialog from the movie, (ii) Visual model: using only the visual content from the movie, and (iii) Hybrid model: using the dialog and the visual content from the movie. Experiments on the publicly available MovieBook dataset shows the effectiveness of the proposed models.
△ Less
Submitted 16 August, 2017;
originally announced August 2017.
-
DARVIZ: Deep Abstract Representation, Visualization, and Verification of Deep Learning Models
Authors:
Anush Sankaran,
Rahul Aralikatte,
Senthil Mani,
Shreya Khare,
Naveen Panwar,
Neelamadhav Gantayat
Abstract:
Traditional software engineering programming paradigms are mostly object or procedure oriented, driven by deterministic algorithms. With the advent of deep learning and cognitive sciences there is an emerging trend for data-driven programming, creating a shift in the programming paradigm among the software engineering communities. Visualizing and interpreting the execution of a current large scale…
▽ More
Traditional software engineering programming paradigms are mostly object or procedure oriented, driven by deterministic algorithms. With the advent of deep learning and cognitive sciences there is an emerging trend for data-driven programming, creating a shift in the programming paradigm among the software engineering communities. Visualizing and interpreting the execution of a current large scale data-driven software development is challenging. Further, for deep learning development there are many libraries in multiple programming languages such as TensorFlow (Python), CAFFE (C++), Theano (Python), Torch (Lua), and Deeplearning4j (Java), driving a huge need for interoperability across libraries.
△ Less
Submitted 16 August, 2017;
originally announced August 2017.
-
A Finitary Analogue of the Downward Löwenheim-Skolem Property
Authors:
Abhisekh Sankaran
Abstract:
We present a model-theoretic property of finite structures, that can be seen to be a finitary analogue of the well-studied downward Löwenheim-Skolem property from classical model theory. We call this property as the *$\mathcal{L}$-equivalent bounded substructure property*, denoted $\mathcal{L}$-$\mathsf{EBSP}$, where $\mathcal{L}$ is either FO or MSO. Intuitively $\mathcal{L}$-$\mathsf{EBSP}$ stat…
▽ More
We present a model-theoretic property of finite structures, that can be seen to be a finitary analogue of the well-studied downward Löwenheim-Skolem property from classical model theory. We call this property as the *$\mathcal{L}$-equivalent bounded substructure property*, denoted $\mathcal{L}$-$\mathsf{EBSP}$, where $\mathcal{L}$ is either FO or MSO. Intuitively $\mathcal{L}$-$\mathsf{EBSP}$ states that a large finite structure contains a small "logically similar" substructure, where logical similarity means indistinguishability with respect to sentences of $\mathcal{L}$ having a given quantifier nesting depth. It turns out that this simply stated property is enjoyed by a variety of classes of interest in computer science: examples include various classes of posets, such as regular languages of words, trees (unordered, ordered or ranked) and nested words, and various classes of graphs, such as cographs, graph classes of bounded tree-depth, those of bounded shrub-depth and $n$-partite cographs. Further, $\mathcal{L}$-$\mathsf{EBSP}$ remains preserved in the classes generated from the above by operations that are implementable using quantifier-free translation schemes. We show that for natural tree representations for structures that all the aforementioned classes admit, the small and logically similar substructure of a large structure can be computed in time linear in the size of the representation, giving linear time fixed parameter tractable (f.p.t.) algorithms for checking $\mathcal{L}$ definable properties of the large structure. We conclude by presenting a strengthening of $\mathcal{L}$-$\mathsf{EBSP}$, that asserts "logical self-similarity at all scales" for a suitable notion of scale. We call this the *logical fractal* property and show that most of the classes mentioned above are indeed, logical fractals.
△ Less
Submitted 12 May, 2017;
originally announced May 2017.
-
A Generalization of the Łoś-Tarski Preservation Theorem
Authors:
Abhisekh Sankaran
Abstract:
In this dissertation, we present for each natural number $k$, semantic characterizations of the $\exists^k \forall^*$ and $\forall^k \exists^*$ prefix classes of first order logic sentences, over all structures finite and infinite. This result, that we call the *generalized Łoś-Tarski theorem*, abbreviated $\mathsf{GLT}(k)$, yields the classical Łoś-Tarski preservation theorem when $k$ equals 0. I…
▽ More
In this dissertation, we present for each natural number $k$, semantic characterizations of the $\exists^k \forall^*$ and $\forall^k \exists^*$ prefix classes of first order logic sentences, over all structures finite and infinite. This result, that we call the *generalized Łoś-Tarski theorem*, abbreviated $\mathsf{GLT}(k)$, yields the classical Łoś-Tarski preservation theorem when $k$ equals 0. It also provides new characterizations of the $Σ^0_2$ and $Π^0_2$ prefix classes, that are finer than all characterizations of these classes in the literature. Further, our semantic notions are finitary in nature, in contrast to those contained in the literature characterizations.
In the context of finite structures, we formulate an abstract combinatorial property of structures, that when satisfied by a class, ensures that $\mathsf{GLT}(k)$ holds over the class. This property, that we call the *Equivalent Bounded Substructure Property*, abbreviated $\mathsf{EBSP}$, intuitively states that a large structure contains a small "logically similar" substructure. It turns out that this simply stated property is enjoyed by a variety of classes of interest in computer science: examples include words, trees (unordered, ordered or ranked), nested words, graph classes of bounded tree-depth/shrub-depth, and $m$-partite cographs. Further, $\mathsf{EBSP}$ remains preserved under various well-studied operations, such as complementation, transpose, the line-graph operation, disjoint union, cartesian and tensor products, etc. This enables constructing a wide spectrum of classes that satisfy $\mathsf{EBSP}$, and hence $\mathsf{GLT}(k)$. Remarkably, $\mathsf{EBSP}$ can be regarded as a finitary analogue of the classical downward Löwenheim-Skolem property.
In summary, this dissertation provides new notions and results in both contexts, that of all structures and that of finite structures.
△ Less
Submitted 20 September, 2016;
originally announced September 2016.
-
TTC: A Tensor Transposition Compiler for Multiple Architectures
Authors:
Paul Springer,
Aravind Sankaran,
Paolo Bientinesi
Abstract:
We consider the problem of transposing tensors of arbitrary dimension and describe TTC, an open source domain-specific parallel compiler. TTC generates optimized parallel C++/CUDA C code that achieves a significant fraction of the system's peak memory bandwidth. TTC exhibits high performance across multiple architectures, including modern AVX-based systems (e.g.,~Intel Haswell, AMD Steamroller), I…
▽ More
We consider the problem of transposing tensors of arbitrary dimension and describe TTC, an open source domain-specific parallel compiler. TTC generates optimized parallel C++/CUDA C code that achieves a significant fraction of the system's peak memory bandwidth. TTC exhibits high performance across multiple architectures, including modern AVX-based systems (e.g.,~Intel Haswell, AMD Steamroller), Intel's Knights Corner as well as different CUDA-based GPUs such as NVIDIA's Kepler and Maxwell architectures. We report speedups of TTC over a meaningful baseline implementation generated by external C++ compilers; the results suggest that a domain-specific compiler can outperform its general purpose counterpart significantly: For instance, comparing with Intel's latest C++ compiler on the Haswell and Knights Corner architecture, TTC yields speedups of up to $8\times$ and $32\times$, respectively. We also showcase TTC's support for multiple leading dimensions, making it a suitable candidate for the generation of performance-critical packing functions that are at the core of the ubiquitous BLAS 3 routines.
△ Less
Submitted 5 July, 2016;
originally announced July 2016.
-
A Generalization of the Łoś-Tarski Preservation Theorem over Classes of Finite Structures
Authors:
Abhisekh Sankaran,
Bharat Adsul,
Supratik Chakraborty
Abstract:
We investigate a generalization of the Łoś-Tarski preservation theorem via the semantic notion of \emph{preservation under substructures modulo $k$-sized cores}. It was shown earlier that over arbitrary structures, this semantic notion for first-order logic corresponds to definability by $\exists^k\forall^*$ sentences. In this paper, we identify two properties of classes of finite structures that…
▽ More
We investigate a generalization of the Łoś-Tarski preservation theorem via the semantic notion of \emph{preservation under substructures modulo $k$-sized cores}. It was shown earlier that over arbitrary structures, this semantic notion for first-order logic corresponds to definability by $\exists^k\forall^*$ sentences. In this paper, we identify two properties of classes of finite structures that ensure the above correspondence. The first is based on well-quasi-ordering under the embedding relation. The second is a logic-based combinatorial property that strictly generalizes the first. We show that starting with classes satisfying any of these properties, the classes obtained by applying operations like disjoint union, cartesian and tensor products, or by forming words and trees over the classes, inherit the same property. As a fallout, we obtain interesting classes of structures over which an effective version of the Łoś-Tarski theorem holds.
△ Less
Submitted 23 January, 2014;
originally announced January 2014.
-
Generalizations of the Los-Tarski Preservation Theorem
Authors:
Abhisekh Sankaran,
Bharat Adsul,
Supratik Chakraborty
Abstract:
We present new preservation theorems that semantically characterize the $\exists^k \forall^*$ and $\forall^k \exists^*$ prefix classes of first order logic, for each natural number $k$. Unlike preservation theorems in the literature that characterize the $\exists^* \forall^*$ and $\forall^* \exists^*$ prefix classes, our theorems relate the count of quantifiers in the leading block of the quantifi…
▽ More
We present new preservation theorems that semantically characterize the $\exists^k \forall^*$ and $\forall^k \exists^*$ prefix classes of first order logic, for each natural number $k$. Unlike preservation theorems in the literature that characterize the $\exists^* \forall^*$ and $\forall^* \exists^*$ prefix classes, our theorems relate the count of quantifiers in the leading block of the quantifier prefix to natural quantitative properties of the models. As special cases of our results, we obtain the classical Los-Tarski preservation theorem for sentences in both its extensional and substructural versions. For arbitrary finite vocabularies, we also generalize the extensional version of the Los-Tarski preservation theorem for theories. We also present an interpolant-based approach towards these results. Finally, we present partial results towards generalizing to theories, the substructural version of the Los-Tarski theorem and in the process, we give a preservation theorem that provides a semantic characterization of $Σ^0_n$ theories for each natural number $n$.
△ Less
Submitted 17 June, 2013; v1 submitted 18 February, 2013;
originally announced February 2013.
-
Preservation under Substructures modulo Bounded Cores
Authors:
Abhisekh Sankaran,
Bharat Adsul,
Vivek Madan,
Pritish Kamath,
Supratik Chakraborty
Abstract:
We investigate a model-theoretic property that generalizes the classical notion of "preservation under substructures". We call this property \emph{preservation under substructures modulo bounded cores}, and present a syntactic characterization via $Σ_2^0$ sentences for properties of arbitrary structures definable by FO sentences. As a sharper characterization, we further show that the count of exi…
▽ More
We investigate a model-theoretic property that generalizes the classical notion of "preservation under substructures". We call this property \emph{preservation under substructures modulo bounded cores}, and present a syntactic characterization via $Σ_2^0$ sentences for properties of arbitrary structures definable by FO sentences. As a sharper characterization, we further show that the count of existential quantifiers in the $Σ_2^0$ sentence equals the size of the smallest bounded core. We also present our results on the sharper characterization for special fragments of FO and also over special classes of structures. We present a (not FO-definable) class of finite structures for which the sharper characterization fails, but for which the classical Łoś-Tarski preservation theorem holds. As a fallout of our studies, we obtain combinatorial proofs of the Łoś-Tarski theorem for some of the aforementioned cases.
△ Less
Submitted 12 July, 2012; v1 submitted 7 May, 2012;
originally announced May 2012.
-
Software Design Document, Testing, and Deployment and Configuration Management of the UUIS - a Team 1 COMP5541-W10 Project Approach
Authors:
Abirami Sankaran,
Andriy Samsonyuk,
Maab Attar,
Mohammad Parham,
Olena Zayikina,
Omar Jandali Rifai,
Pavel Lepin,
Rana Hassan
Abstract:
The document presents a detailed description of the designs for the implementation of the Unified University Inventory System for the Imaginary University of Arctica. The document, through numerous diagrams and UI samples, gives the structure of the system and the functions of its modules. It also gives test cases and reports that support the system's architecture and design.
The document presents a detailed description of the designs for the implementation of the Unified University Inventory System for the Imaginary University of Arctica. The document, through numerous diagrams and UI samples, gives the structure of the system and the functions of its modules. It also gives test cases and reports that support the system's architecture and design.
△ Less
Submitted 4 May, 2010;
originally announced May 2010.
-
Software Requirements Specification of the IUfA's UUIS -- a Team 1 COMP5541-W10 Project Approach
Authors:
Abirami Sankaran,
Andriy Samsonyuk,
Maab Attar,
Mohammad Parham,
Olena Zayikina,
Omar Jandali Rifai,
Pavel Lepin,
Rana Hassan
Abstract:
Unified University Inventory System (UUIS), is an inventory system created for the Imaginary University of Arctica (IUfA) to facilitate its inventory management, of all the faculties in one system. Team 1 elucidates the functions of the system and the characteristics of the users who have access to these functions. It shows the access restrictions to different functionalities of the system provide…
▽ More
Unified University Inventory System (UUIS), is an inventory system created for the Imaginary University of Arctica (IUfA) to facilitate its inventory management, of all the faculties in one system. Team 1 elucidates the functions of the system and the characteristics of the users who have access to these functions. It shows the access restrictions to different functionalities of the system provided to users, who are the staff and students of the University. Team 1, also, emphasises on the necessary steps required to prevent the security of the system and its data.
△ Less
Submitted 3 May, 2010;
originally announced May 2010.
-
On Semantic Generalizations of the Bernays-Schönfinkel-Ramsey Class with Finite or Co-finite Spectra
Authors:
Abhisekh Sankaran,
Supratik Chakraborty
Abstract:
Motivated by model-theoretic properties of the BSR class, we present a family of semantic classes of FO formulae with finite or co-finite spectra over a relational vocabulary Σ. A class in this family is denoted EBS_Σ(σ), where σis a subset of Σ. Formulae in EBS_Σ(σ) are preserved under substructures modulo a bounded core and modulo re-interpretation of predicates outside σ. We study properties…
▽ More
Motivated by model-theoretic properties of the BSR class, we present a family of semantic classes of FO formulae with finite or co-finite spectra over a relational vocabulary Σ. A class in this family is denoted EBS_Σ(σ), where σis a subset of Σ. Formulae in EBS_Σ(σ) are preserved under substructures modulo a bounded core and modulo re-interpretation of predicates outside σ. We study properties of the family EBS_Σ= {EBS_Σ(σ) | σ\subseteq Σ}, e.g. classes in EBS_Σare spectrally indistinguishable, EBS_Σ(Σ) is semantically equivalent to BSR over Σ, and EBS_Σ(\emptyset) is the set of all FO formulae over Σwith finite or co-finite spectra. Furthermore, (EBS_Σ, \subseteq) forms a lattice isomorphic to the powerset lattice (\wp(Σ), \subseteq). This gives a natural semantic generalization of BSR as ascending chains in (EBS_Σ, \subseteq). Many well-known FO classes are semantically subsumed by EBS_Σ(Σ) or EBS_Σ(\emptyset). Our study provides alternative proofs of interesting results like the Loś-Tarski Theorem and the semantic subsumption of the Löwenheim class with equality by BSR. We also present a syntactic sub-class of EBS_Σ(σ) called EDP_Σ(σ) and give an expression for the size of the bounded cores of models of EDP_Σ(σ) formulae. We show that the EDP_Σ(σ) classes also form a lattice structure. Finally, we study some closure properties and applications of the classes presented.
△ Less
Submitted 4 March, 2010; v1 submitted 23 February, 2010;
originally announced February 2010.