High Performance Sparse Multivariate Polynomials: Fundamental Data Structures and Algorithms

Total Page:16

File Type:pdf, Size:1020Kb

High Performance Sparse Multivariate Polynomials: Fundamental Data Structures and Algorithms Western University Scholarship@Western Electronic Thesis and Dissertation Repository 8-24-2018 11:00 AM High Performance Sparse Multivariate Polynomials: Fundamental Data Structures and Algorithms Alex Brandt The University of Western Ontario Supervisor Moreno Maza, Marc The University of Western Ontario Graduate Program in Computer Science A thesis submitted in partial fulfillment of the equirr ements for the degree in Master of Science © Alex Brandt 2018 Follow this and additional works at: https://ir.lib.uwo.ca/etd Part of the Algebra Commons, Numerical Analysis and Scientific Computing Commons, and the Theory and Algorithms Commons Recommended Citation Brandt, Alex, "High Performance Sparse Multivariate Polynomials: Fundamental Data Structures and Algorithms" (2018). Electronic Thesis and Dissertation Repository. 5593. https://ir.lib.uwo.ca/etd/5593 This Dissertation/Thesis is brought to you for free and open access by Scholarship@Western. It has been accepted for inclusion in Electronic Thesis and Dissertation Repository by an authorized administrator of Scholarship@Western. For more information, please contact [email protected]. Abstract Polynomials may be represented sparsely in an effort to conserve memory usage and pro- vide a succinct and natural representation. Moreover, polynomials which are themselves sparse { have very few non-zero terms { will have wasted memory and computation time if represented, and operated on, densely. This waste is exacerbated as the number of variables increases. We provide practical implementations of sparse multivariate data structures focused on data locality and cache complexity. We look to develop high-performance algorithms and implementations of fundamen- tal polynomial operations, using these sparse data structures, such as arithmetic (ad- dition, subtraction, multiplication, and division) and interpolation. We revisit a sparse arithmetic scheme introduced by Johnson in 1974, adapting and optimizing these algo- rithms for modern computer architectures, with our implementations over the integers and rational numbers vastly outperforming the current wide-spread implementations. We develop a new algorithm for sparse pseudo-division based on the sparse polynomial division algorithm, with very encouraging results. Polynomial interpolation is explored through univariate, dense multivariate, and sparse multivariate methods. Arithmetic and interpolation together form a solid high-performance foundation from which many higher-level and more interesting algorithms can be built. Keywords: Sparse Polynomials, Polynomial Arithmetic, Polynomial Interpolation, Data Structures, High-Performance, Polynomial Multiplication, Polynomial Division, Pseudo-Division i Contents Abstract i List of Tables iv List of Figures v List of Algorithms vi 1 Introduction 1 1.1 Existing Computer Algebra Systems and Software . 2 1.2 Reinventing the Sparse Polynomial Wheel? . 3 1.3 Contributions . 4 2 Background 6 2.1 Memory, Cache, and Locality . 6 2.1.1 Cache Performance and Cache Complexity . 7 2.2 Algebra . 9 2.2.1 The Many Flavours of Rings . 9 2.2.2 Polynomials: Rings, Definitions, and Notations . 11 2.2.3 Arithmetic in a Polynomial Ring . 14 Pseudo-division . 16 2.2.4 Gr¨obnerBases, Ideals, and Reduction . 17 2.2.5 Algebraic Geometry . 20 2.2.6 (Numerical) Linear Algebra . 21 2.3 Representing Polynomials . 22 2.4 Working with Sparse Polynomials . 24 2.5 Interpolation & Curve Fitting . 27 2.5.1 Lagrange Interpolation . 30 2.5.2 Newton Interpolation . 31 2.5.3 Curve Fitting and Linear Least Squares . 32 2.6 Symbols and Notation . 33 3 Memory-Conscious Polynomial Representations 35 3.1 Coefficients, Monomials, and Exponent Packing . 36 3.2 Linked Lists . 38 3.3 Alternating Arrays . 38 ii 3.4 Recursive Arrays . 42 4 Polynomial Arithmetic 45 4.1 In-place Addition and Subtraction . 45 4.2 Multiplication . 47 4.2.1 Implementation . 51 Heap Optimizations . 52 4.2.2 Experimentation . 54 4.3 Division . 59 4.3.1 Implementation . 63 4.3.2 Experimentation . 64 4.4 Pseudo-Division . 66 4.4.1 Implementation . 70 4.4.2 Experimentation . 72 4.5 Normal Form and Multi-Divisor Pseudo-Division . 75 5 Symbolic and Numeric Polynomial Interpolation 76 5.1 Univariate Polynomial Interpolation . 77 5.2 Dense Multivariate Interpolation . 81 5.2.1 Implementing Early Termination for Multivariate Interpolation . 83 5.2.2 The Difficulties of Multivariate Interpolation . 85 5.2.3 Rational Function Interpolation . 88 5.3 Sparse Multivariate Interpolation . 90 5.3.1 Probabilistic Method . 90 5.3.2 Deterministic Method . 94 5.3.3 Experimentation . 97 5.4 Numerical Interpolation (& Curve Fitting) . 99 6 Conclusions and Future Work 101 Bibliography 103 Curriculum Vitae 108 iii List of Tables 4.1 Comparing heap implementations with and without chaining . 56 4.2 Comparing pseudo-division on triangular decompositions . 75 iv List of Figures 2.1 Array representation of a dense univariate polynomial . 22 2.2 Array representation of a dense recursive multivariate polynomial . 24 3.1 A 3-variable exponent vector packed into a single machine word. 37 3.2 A polynomial encoded as a linked list . 38 3.3 A polynomial encoded as an alternating array . 39 3.4 Comparing linked list and alternating array implementations of polynomial addition . 40 3.5 Comparing cache misses in polynomial addition . 41 3.6 Array representation of a dense recursive multivariate polynomial . 42 3.7 An alternating array and recursive array polynomial representation . 43 4.1 Alternating array representation showing GMP trees . 46 4.2 Comparing in-place and out-of-place polynomial addition . 47 4.3 An example heap of integers . 48 4.4 A chained heap of product terms . 55 4.5 Comparing multiplication of integer polynomials . 57 4.6 Comparing multiplication of rational number polynomials . 58 4.7 Comparing cache misses in polynomial multiplication . 58 4.8 Comparing division of integer polynomials . 65 4.9 Comparing division of rational number polynomials . 65 4.10 A recursive polynomial representation for a pseudo-quotient . 71 4.11 Comparing pseudo-division of integer polynomials . 73 4.12 Comparing pseudo-division of rational number polynomials . 73 4.13 Comparing naive and heap-based pseudo-division . 74 5.1 Comparing univariate interpolation implementations . 80 5.2 A collection of points satisfying condition GC . 87 5.3 Comparing probabilistic and deterministic sparse interpolation algorithms 98 v List of Algorithms 2.1 polynomialDivision ............................ 16 2.2 na¨ıvePseudoDivision ........................... 17 2.3 addPolynomials .............................. 26 2.4 multiplyPolynomials ........................... 28 4.1 heapMultiplyPolynomials ........................ 49 4.2 dividePolynomials ............................. 59 4.3 heapDividePolynomials ......................... 61 4.4 pseudoDividePolynomials ........................ 67 4.5 heapPseudoDividePolynomials ..................... 69 5.1 LagrangeInterpolation ......................... 79 5.2 multiplyByBinomial InPlace ...................... 80 5.3 denseInterpolation Driver ....................... 84 5.4 sparseInterpolation StageI ...................... 93 5.5 sparseInterpolation ........................... 93 5.6 sparseInterpolation StageI Deterministic ............. 96 5.7 sparseInterpolation Deterministic .................. 96 vi Chapter 1 Introduction In the world of computer algebra and scientific computing, high-performance is paramount. Due to the exact nature of symbolic computations (in fact that is one of the defining characteristics of computer algebra) it is possible to be far more expressive than in nu- merical methods, leading to more complicated mathematical formulas and theories. But as these formulas, problems, and data sets grow large, the intermediate expressions which arise during the process of solving these problems grow even larger. This expression swell is one reason why computer algebra has historically been seen as slow and impractical. Compared to that of numerical analysis, where floating point numbers occupy a fixed amount of space regardless of their value, symbolic computation uses arbitrary precision, allowing numbers to grow and grow. Hence, careful implementation is needed to avoid such drastic slow downs and make symbolic computation able to be practical and useful in solving mathematical and scientific problems. One such problem we are concerned with is polynomial system solving. Of course, this is an important problem with applications in every scientific discipline. Algorithms for solving these systems typically rely on some core operation after some algebraic tricks attempt to reduce the system's complexity. This core operation could be based on Gr¨obnerbases or triangular decompositions. We are motivated by the efforts to ob- tain an efficient and open source implementation of triangular decompositions using the theory of regular chains [4]. Such algorithms [18] have already been integrated into the computer algebra system Maple as part of the RegularChains library [53]. However, we believe that we can do better. The Basic Polynomial Algebra Subprograms (BPAS) library [2] is an open-source li- brary for high performance polynomial operations, such as arithmetic, real root isolation, and polynomial system solving. It is mainly written in C for performance, with a C++ wrapper interface for portability, object-oriented programming, and end-user usability. Moreover, it makes use of the Cilk extension [52] for parallelization and improved per- formance on multi-core processors. It is within
Recommended publications
  • Data Structure
    EDUSAT LEARNING RESOURCE MATERIAL ON DATA STRUCTURE (For 3rd Semester CSE & IT) Contributors : 1. Er. Subhanga Kishore Das, Sr. Lect CSE 2. Mrs. Pranati Pattanaik, Lect CSE 3. Mrs. Swetalina Das, Lect CA 4. Mrs Manisha Rath, Lect CA 5. Er. Dillip Kumar Mishra, Lect 6. Ms. Supriti Mohapatra, Lect 7. Ms Soma Paikaray, Lect Copy Right DTE&T,Odisha Page 1 Data Structure (Syllabus) Semester & Branch: 3rd sem CSE/IT Teachers Assessment : 10 Marks Theory: 4 Periods per Week Class Test : 20 Marks Total Periods: 60 Periods per Semester End Semester Exam : 70 Marks Examination: 3 Hours TOTAL MARKS : 100 Marks Objective : The effectiveness of implementation of any application in computer mainly depends on the that how effectively its information can be stored in the computer. For this purpose various -structures are used. This paper will expose the students to various fundamentals structures arrays, stacks, queues, trees etc. It will also expose the students to some fundamental, I/0 manipulation techniques like sorting, searching etc 1.0 INTRODUCTION: 04 1.1 Explain Data, Information, data types 1.2 Define data structure & Explain different operations 1.3 Explain Abstract data types 1.4 Discuss Algorithm & its complexity 1.5 Explain Time, space tradeoff 2.0 STRING PROCESSING 03 2.1 Explain Basic Terminology, Storing Strings 2.2 State Character Data Type, 2.3 Discuss String Operations 3.0 ARRAYS 07 3.1 Give Introduction about array, 3.2 Discuss Linear arrays, representation of linear array In memory 3.3 Explain traversing linear arrays, inserting & deleting elements 3.4 Discuss multidimensional arrays, representation of two dimensional arrays in memory (row major order & column major order), and pointers 3.5 Explain sparse matrices.
    [Show full text]
  • Data Structure Invariants
    Lecture 8 Notes Data Structures 15-122: Principles of Imperative Computation (Spring 2016) Frank Pfenning, André Platzer, Rob Simmons 1 Introduction In this lecture we introduce the idea of imperative data structures. So far, the only interfaces we’ve used carefully are pixels and string bundles. Both of these interfaces had the property that, once we created a pixel or a string bundle, we weren’t interested in changing its contents. In this lecture, we’ll talk about an interface that mimics the arrays that are primitively available in C0. To implement this interface, we’ll need to round out our discussion of types in C0 by discussing pointers and structs, two great tastes that go great together. We will discuss using contracts to ensure that pointer accesses are safe. Relating this to our learning goals, we have Computational Thinking: We illustrate the power of abstraction by con- sidering both the client-side and library-side of the interface to a data structure. Algorithms and Data Structures: The abstract arrays will be one of our first examples of abstract datatypes. Programming: Introduction of structs and pointers, use and design of in- terfaces. 2 Structs So far in this course, we’ve worked with five different C0 types — int, bool, char, string, and arrays t[] (there is a array type t[] for every type t). The character, Boolean and integer values that we manipulate, store LECTURE NOTES Data Structures L8.2 locally, and pass to functions are just the values themselves. For arrays (and strings), the things we store in assignable variables or pass to functions are addresses, references to the place where the data stored in the array can be accessed.
    [Show full text]
  • Using Machine Learning to Improve Dense and Sparse Matrix Multiplication Kernels
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2019 Using machine learning to improve dense and sparse matrix multiplication kernels Brandon Groth Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Applied Mathematics Commons, and the Computer Sciences Commons Recommended Citation Groth, Brandon, "Using machine learning to improve dense and sparse matrix multiplication kernels" (2019). Graduate Theses and Dissertations. 17688. https://lib.dr.iastate.edu/etd/17688 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Using machine learning to improve dense and sparse matrix multiplication kernels by Brandon Micheal Groth A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Applied Mathematics Program of Study Committee: Glenn R. Luecke, Major Professor James Rossmanith Zhijun Wu Jin Tian Kris De Brabanter The student author, whose presentation of the scholarship herein was approved by the program of study committee, is solely responsible for the content of this dissertation. The Graduate College will ensure this dissertation is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2019 Copyright c Brandon Micheal Groth, 2019. All rights reserved. ii DEDICATION I would like to dedicate this thesis to my wife Maria and our puppy Tiger.
    [Show full text]
  • Verification-Aware Opencl Based Read Mapper for Heterogeneous
    JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 CORAL: Verification-aware OpenCL based Read Mapper for Heterogeneous Systems Sidharth Maheshwari, Venkateshwarlu Y. Gudur, Rishad Shafik, Senion Member, IEEE, Ian Wilson, Alex Yakovlev, Fellow, IEEE, and Amit Acharyya, Member, IEEE Abstract—Genomics has the potential to transform medicine from reactive to a personalized, predictive, preventive and participatory (P4) form. Being a Big Data application with continuously increasing rate of data production, the computational costs of genomics have become a daunting challenge. Most modern computing systems are heterogeneous consisting of various combinations of computing resources, such as CPUs, GPUs and FPGAs. They require platform-specific software and languages to program making their simultaneous operation challenging. Existing read mappers and analysis tools in the whole genome sequencing (WGS) pipeline do not scale for such heterogeneity. Additionally, the computational cost of mapping reads is high due to expensive dynamic programming based verification, where optimized implementations are already available. Thus, improvement in filtration techniques is needed to reduce verification overhead. To address the aforementioned limitations with regards to the mapping element of the WGS pipeline, we propose a Cross-platfOrm Read mApper using opencL (CORAL). CORAL is capable of executing on heterogeneous devices/platforms simultaneously. It can reduce computational time by suitably distributing the workload without any additional programming effort. We showcase this on a quadcore Intel CPU along with two Nvidia GTX 590 GPUs, distributing the workload judiciously to achieve up to 2× speedup compared to when only CPUs are used. To reduce the verification overhead, CORAL dynamically adapts k-mer length during filtration.
    [Show full text]
  • Applying Front End Compiler Process to Parse Polynomials in Parallel
    Western University Scholarship@Western Electronic Thesis and Dissertation Repository 12-16-2020 10:30 AM Applying Front End Compiler Process to Parse Polynomials in Parallel Amha W. Tsegaye, The University of Western Ontario Supervisor: Dr. Marc Moreno Maza, The University of Western Ontario A thesis submitted in partial fulfillment of the equirr ements for the Master of Science degree in Computer Science © Amha W. Tsegaye 2020 Follow this and additional works at: https://ir.lib.uwo.ca/etd Part of the Computer Sciences Commons, and the Mathematics Commons Recommended Citation Tsegaye, Amha W., "Applying Front End Compiler Process to Parse Polynomials in Parallel" (2020). Electronic Thesis and Dissertation Repository. 7592. https://ir.lib.uwo.ca/etd/7592 This Dissertation/Thesis is brought to you for free and open access by Scholarship@Western. It has been accepted for inclusion in Electronic Thesis and Dissertation Repository by an authorized administrator of Scholarship@Western. For more information, please contact [email protected]. Abstract Parsing large expressions, in particular large polynomial expressions, is an important task for computer algebra systems. Despite of the apparent simplicity of the problem, its efficient software implementation brings various challenges. Among them is the fact that this is a memory bound application for which a multi-threaded implementation is necessarily limited by the characteristics of the memory organization of supporting hardware. In this thesis, we design, implement and experiment with a multi-threaded parser for large polynomial expressions. We extract parallelism by splitting the input character string, into meaningful sub-strings that can be parsed concurrently before being merged into a single polynomial.
    [Show full text]
  • Exploratory Large Scale Graph Analytics in Arkouda 59 2 60 3 61 4 Zhihui Du,Oliver Alvarado Rodriguez and Michael Merrill and William Reus 62 5 David A
    1 Exploratory Large Scale Graph Analytics in Arkouda 59 2 60 3 61 4 Zhihui Du,Oliver Alvarado Rodriguez and Michael Merrill and William Reus 62 5 David A. Bader [email protected] 63 6 {zhihui.du,oaa9,bader}@njit.edu [email protected] 64 7 New Jersey Institute of Technology Department of Defense 65 8 Newark, New Jersey, USA USA 66 9 67 10 ABSTRACT 1 INTRODUCTION 68 11 Exploratory graph analytics helps maximize the informational value A graph is a well defined mathematical model to formulate the rela- 69 12 for a graph. However, the increasing graph size makes it impossi- tionship between different objects and is widely used in numerous 70 13 ble for existing popular exploratory data analysis tools to handle domains such as social sciences, biological systems, and informa- 71 14 dozens-of-terabytes or even larger data sets in the memory of a tion systems. The edge distributions of many large scale real world 72 15 common laptop/personal computer. Arkouda is a framework un- problems tend to follow a power-law distribution [1, 11, 26]. Dense 73 16 der early-development that brings together the productivity of graph data structures and algorithms will consume much more 74 17 Python at the user side with the high-performance of Chapel at memory and cannot analyze very large sparse graphs efficiently. 75 18 the server side. In this paper, the preliminary work on overcoming Therefore, parallel algorithms for sparse graphs [23] have become 76 19 the memory limit and high performance computing coding road- an important research topic to efficiently analyze the large and 77 20 block for high level Python users to perform large graph analysis sparse graphs from different real-world problems.
    [Show full text]
  • Array Data Structure
    © 2014 IJIRT | Volume 1 Issue 6 | ISSN : 2349-6002 ARRAY DATA STRUCTURE Isha Batra, Divya Raheja Information Technology Dronacharya College Of Engineering, Farukhnagar,Gurgaon Abstract- In computer science, an array data structure valid index tuples and the addresses of the elements or simply an array is a data structure consisting of a (and hence the element addressing formula) are collection of elements (values or variables), each usually but not always fixed while the array is in use. identified by at least one array index or key. An array is The term array is often used to mean array data type, stored so that the position of each element can be a kind of data type provided by most high-level computed from its index tuple by a mathematical formula. The simplest type of data structure is a linear programming languages that consists of a collection array, also called one-dimensional array. For example, of values or variables that can be selected by one or an array of 10 32-bit integer variables, with indices 0 more indices computed at run-time. Array types are through 9, may be stored as 10 words at memory often implemented by array structures; however, in addresses 2000, 2004, 2008, … 2036, so that the element some languages they may be implemented by hash with index i has the address 2000 + 4 × i. The term array tables, linked lists, search trees, or other data is often used to mean array data type, a kind of data structures. The term is also used, especially in the type provided by most high-level programming description of algorithms, to mean associative array languages that consists of a collection of values or or "abstract array", a theoretical computer science variables that can be selected by one or more indices computed at run-time.
    [Show full text]
  • View of This Work
    INFORMATION TO USERS The most advanced technology has been used to photo­ graph and reproduce this manuscript from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are re­ produced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. These are also available as one exposure on a standard 35mm slide or as a 17" x 23" black and white photographic print for an additional charge. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. University Microfilms International A Bell & Howell Information Company 300 North Zeeb Road, Ann Arbor, Ml 48106-1346 USA 313/761-4700 800/521-0600 Order Number 8824450 Performance evaluation of RISC-based architectures for image processing Al-Ghitany, Nashat El-Khameesy, Ph.D.
    [Show full text]
  • When Prefetching Works, When It Doesn&Rsquo
    When Prefetching Works, When It Doesn’t, and Why JAEKYU LEE, HYESOON KIM, and RICHARD VUDUC, Georgia Institute of Technology 2 In emerging and future high-end processor systems, tolerating increasing cache miss latency and properly managing memory bandwidth will be critical to achieving high performance. Prefetching, in both hardware and software, is among our most important available techniques for doing so; yet, we claim that prefetching is perhaps also the least well-understood. Thus, the goal of this study is to develop a novel, foundational understanding of both the benefits and limitations of hardware and software prefetching. Our study includes: source code-level analysis, to help in understanding the practical strengths and weaknesses of compiler- and software-based prefetching; a study of the synergistic and antagonistic effects between software and hardware prefetching; and an evaluation of hardware prefetching training policies in the presence of software prefetching requests. We use both simulation and measurement on real systems. We find, for instance, that although there are many opportu- nities for compilers to prefetch much more aggressively than they currently do, there is also a tangible risk of interference with training existing hardware prefetching mechanisms. Taken together, our observations suggest new research directions for cooperative hardware/software prefetching. Categories and Subject Descriptors: B.3.2 [Memory Structures]: Design Styles—Cache memories; B.3.3 [Memory Structures]: Performance Analysis and Design Aids—Simulation; D.3.4 [Programming Languages]: Processors—Optimization General Terms: Experimentation, Performance Additional Key Words and Phrases: Prefetching, cache ACM Reference Format: Lee, J., Kim, H., and Vuduc, R. 2012. When prefetching works, when it doesn’t, and why.
    [Show full text]
  • Array Data Structure
    ARRAY DATA STRUCTURE Javascript Array Object An array is a data structure common to all modern programming languages. Arrays are temporary data structures, that is they only exist so long as the program is running. Once the program is terminated any data contained in an array is lost. To use the built in Array object you must first create an instance of it using the new keyword. An array can be manipulated as a single entity, or any single member of the array (called an array element) can be accessed independently. Array elements are usually of the same data type, (but they need not be; because Javascript is a loosely typed language).. Each element is located by an index (or address) pointing to the appropriate cell number. For example, consider a one dimensional array to contain 8 integer numbers:- var myList = new Array(8); The above declaration has informed the compiler to make available 8 cells (locations in memory) that can each hold an integer. To assign the number 8 to the first element of the array is done by the following assignment. Notice that the first cell index starts at zero (0). myList[0] = 8; Once the array has been declared cell values can be assigned in any order. For example the next cell to be assigned a value might be cell 3. After assigning these values you can imagine the memory positions looking like this. Until elements are assigned a value they have the value undefined. index 0 1 2 3 4 5 6 7 value 8 5 5 5 Data is generally entered into an array by one of two methods, namely by assignment as shown above, or by using a loop.
    [Show full text]
  • Unsynchronized Techniques for Approximate Parallel Computing
    Unsynchronized Techniques for Approximate Parallel Computing Martin C. Rinard MIT EECS and CSAIL [email protected] Abstract Now, it may not be immediately clear that it is possible We present techniques for obtaining acceptable unsynchro- to eliminate potentially undesirable interactions in parallel nized parallel computations. Even though these techniques computations without incurring one or more of these dis- may generate interactions (such as data races) that the cur- advantages. We don’t even try — we instead develop ap- rent rigid value system condemns as incorrect, they are en- proaches in which such interactions may indeed take place as gineered to 1) preserve key data structure consistency con- long as they occur infrequently enough for the computation straints while 2) producing a result that is accurate enough, to produce an acceptably accurate result with high enough often enough. And because they contain no synchronization, likelihood. In other words, instead of attempting to deliver they eliminate the synchronization overhead, parallelism re- a perfect/correct computation, we only aspire to deliver a duction, and failure propagation typically associated with computation that is accurate enough, often enough. synchronization mechanisms. This change in perspective calls into question the legiti- We also identify a class of computations that interact well macy of the current rigid value system, which classifies all with our techniques. These computations combine multiple data races as undesirable [4]. It also opens up new regions of contributions to obtain a composite result. Redundancy in the engineering space and enables us to develop new mech- the contributions enables the unsynchronized computation anisms and techniques that deliver advantages unobtainable to produce an acceptably accurate result even though it may, with previous approaches.
    [Show full text]
  • Netlist Security Algorithm Acceleration Using Opencl on Fpgas
    NETLIST SECURITY ALGORITHM ACCELERATION USING OPENCL ON FPGAS Thesis Submitted to The School of Engineering of the UNIVERSITY OF DAYTON In Partial Fulfillment of the Requirements for The Degree of Master of Science in Computer Engineering By Nicholas Michael Pelini UNIVERSITY OF DAYTON Dayton, Ohio August, 2017 NETLIST SECURITY ALGORITHM ACCELERATION USING OPENCL ON FPGAS Name: Pelini, Nicholas Michael APPROVED BY: Eric Balster, Ph.D. Frank Scarpino, Ph.D. Advisor Committee Chairman Committee Member Associate Professor, Department of Professor, Department of Electrical and Electrical and Computer Engineering Computer Engineering John Weber, Ph.D. Committee Member Professor, Department of Electrical and Computer Engineering Robert J. Wilkens, Ph.D., P.E. Eddy M. Rojas, Ph.D., M.A., P. E. Assoc. Dean for Research & Innovation, Dean, School of Engineering Professor School of Engineering ii c Copyright by Nicholas Michael Pelini All rights reserved 2017 ABSTRACT NETLIST SECURITY ALGORITHM ACCELERATION USING OPENCL ON FPGAS Name: Pelini, Nicholas Michael University of Dayton Advisor: Dr. Eric Balster Integrated circuits continue to grow in number of transistors and design complexity. Production of many of these components are also outsourced to facilities in a number of countries. Therefore, there is a need to ensure all parts within a system are reliable and free from modification. Verification tools must be able to assess circuits down to a gate level but also be scalable to assess complex designs. In response to this problem, an accelerated version of verification software is proposed to determine if a manufacturer design is the same as a known, reference design by comparing the circuit’s netlists.
    [Show full text]