Phase-Concurrent Hash Tables for Determinism

Total Page:16

File Type:pdf, Size:1020Kb

Phase-Concurrent Hash Tables for Determinism Phase-Concurrent Hash Tables for Determinism Julian Shun Guy E. Blelloch Carnegie Mellon University Carnegie Mellon University [email protected] [email protected] ABSTRACT same input, while internal determinism also requires certain in- termediate steps of the program to be deterministic (up to some We present a deterministic phase-concurrent hash table in which level of abstraction) [3]. In the context of concurrent access, a data operations of the same type are allowed to proceed concurrently, structure is internally deterministic if even when operations are ap- but operations of different types are not. Phase-concurrency guar- plied concurrently the final observable state depends uniquely on antees that all concurrent operations commute, giving a determin- the set of operations applied, but not on their order. This prop- istic hash table state, guaranteeing that the state of the table at any erty is equivalent to saying the operations commute with respect to quiescent point is independent of the ordering of operations. Fur- the final observable state of the structure [36, 32]. Deterministic thermore, by restricting our hash table to be phase-concurrent, we concurrent data structures are important for developing internally show that we can support operations more efficiently than previous deterministic parallel algorithms—they allow for the structure to concurrent hash tables. Our hash table is based on linear probing, be updated concurrently while generating a deterministic result in- and relies on history-independence for determinism. dependent of the timing or scheduling of threads. Blelloch et al. We experimentally compare our hash table on a modern 40-core show that internally deterministic algorithms using nested paral- machine to the best existing concurrent hash tables that we are lelism and commutative operations on shared state can be efficient, aware of (hopscotch hashing and chained hashing) and show that and their algorithms make heavy use concurrent data structures [3]. we are 1.3–4.1 times faster on random integer keys when opera- tions are restricted to be phase-concurrent. We also show that the However, for certain data structures, the operations naturally do cost of insertions and deletions for our deterministic hash table is not commute. For example, in a hash table mixing insertions and only slightly more expensive than for a non-deterministic version deletions in time would inherently depend on ordering since insert- that we implemented. Compared to standard sequential linear prob- ing and deleting the same element do not commute, but insertions ing, we get up to 52 times speedup on 40 cores with dual hyper- commute with each other and deletions commute with each other, threading. Furthermore, on 40 cores insertions are only about 1:3× independently of value. The same is true for searching mixed with slower than random writes (scatter). We describe several applica- either insertion or deletion. For a data structure in which certain tions which have deterministic solutions using our phase-concurrent operations commute but others do not, it is useful to group the op- hash table, and present experiments showing that using our phase- erations into phases such that the concurrent operations within a concurrent deterministic hash table is only slightly slower than us- phase commute. We define a data structure to be phase-concurrent ing our non-deterministic one and faster than using previous con- if subsets of operations can proceed (safely) concurrently. If the current hash tables, so the cost of determinism is small. operations within a phase also commute, then the data structure is deterministic. Note that phase-concurrency can have other uses Categories and Subject Descriptors: D.1.3 [Programming Tech- besides determinism, such as giving more efficient data structures. niques]: Concurrent Programming—Parallel Programming It is the programmer’s responsibility to separate concurrent opera- tions into phases, with synchronization in between, which for most Keywords: Hash Table, Determinism, Applications nested parallel programs is easy and natural to do. In this paper, we focus on the hash table data structure. We de- 1. INTRODUCTION scribe a deterministic phase-concurrent hash table and prove its Many researchers have argued the importance of deterministic re- correctness. Our data structure builds upon a sequential history- sults in developing and debugging parallel programs (see e.g. [32, independent hash table [4] and allows concurrent insertions, con- 6, 8, 25, 3]). Two types of determinism are distinguished—external current deletions, concurrent searches, and reporting the contents. determinism and internal determinism. External determinism re- It does not allow different types of operations to be mixed in time, quires that the program produce the same output when given the because commutativity (and hence determinism) would be violated in general. We show that using one type of operation at a time is Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed still very useful for many applications. The hash table uses open for profit or commercial advantage and that copies bear this notice and the full cita- addressing with a prioritized variant of linear probing and guaran- tion on the first page. Copyrights for components of this work owned by others than tees that in a quiescent state (when there are no operations ongo- ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- ing) the exact content of the array is independent of the ordering publish, to post on servers or to redistribute to lists, requires prior specific permission of previous updates. This allows, for example, quickly returning and/or a fee. Request permissions from [email protected]. the contents of the hash table in a deterministic order simply by SPAA’14, June 23–25, 2014, Prague, Czech Republic. Copyright 2014 ACM 978-1-4503-2821-0/14/06 ...$15.00 packing out the empty cells, which is useful in many applications. http://dx.doi.org/10.1145/2612669.2612687 . Returning the contents could be done deterministically by sorting, but this is more expensive. Our hash table can store key-value pairs that phase-concurrency can be applied to hash tables to obtain both either directly or via a pointer. determinism and efficiency. We prove correctness and termina- We present timings for insertions, deletions, finds, and return- tion of our deterministic phase-concurrent hash table. Third, we ing the contents into an array on a 40-core machine. We compare present a comprehensive experimental evaluation of our hash ta- these timings with the timings of several other implementations of bles with the fastest existing parallel hash tables. We compare our concurrent and phase-concurrent hash tables, including the fastest deterministic and non-deterministic phase-concurrent linear prob- concurrent open addressing [15] and closed addressing [20] hash ing hash tables, our phase-concurrent implementation of cuckoo tables that we could find, and two of our non-deterministic phase- hashing, hopscotch hashing, which is the fastest existing concur- concurrent implementations (based on linear probing and cuckoo rent open addressing hash table as far as we know, and an opti- hashing). We also compare the implementations to standard se- mized implementation of concurrent chained hashing. Finally, we quential linear probing, and to the sequential history-independent describe several applications of our deterministic hash table, and hash table. Our experiments show that our deterministic hash table present experimental results comparing the running times of using significantly outperforms the existing concurrent (non-deterministic) different hash tables in these applications. versions on updates by a factor of 1.3–4.1. Furthermore, it gets up to a 52× speedup over the (standard) non-deterministic sequential 2. RELATED WORK version on 40 cores with two-way hyper-threading. We compare A data structure is defined to be history-independent if its layout insertions to simply writing into an array at random locations (a depends only on its current contents, and not the ordering of the scatter). On 40 cores, and for a load factor of 1=3, insertions into operations that created it [13, 24]. For sequential data structures, our table is only about 1:3× the cost of random writes. This is be- history-independence is motivated by security concerns, and in par- cause most insertions only involve a single cache miss, as does a ticular ensures that examining a structure after its creation does not random write, and that is the dominant cost. reveal anything about its history. In this paper, we extend a sequen- Such a deterministic hash table is useful in many applications. tial history-independent hash table based on open addressing [4] to For example, Delaunay refinement iteratively adds triangles to a work phase-concurrently. Our motivation is to design a data struc- triangulation until all triangles satisfy some criteria (see Section 5). ture which is deterministic independent of the order of updates. Al- “Bad triangles” which do not satisfy the criteria are broken up into though we are not concerned with exact memory layout, we want smaller triangles, possibly creating new bad triangles. The result to be able to return the contents of the hash table very quickly and of Delaunay refinement depends on the order in which bad trian- in an order that is independent of when the updates arrived. For a gles are added. Blelloch et al. show that using a technique called history-independent open addressing table, this can be done easily deterministic reservations [3], triangles can be added in parallel in by packing the non-empty elements into a contiguous array, which a deterministic order on each iteration. However, for the algorithm just involves a parallel prefix sum and cache-block friendly writes. to be deterministic, the list of new bad triangles returned in each Several concurrent hash tables have been developed over the iteration must also be deterministic.
Recommended publications
  • Shell Scripting with Bash
    Introduction to Shell Scripting with Bash Charles Jahnke Research Computing Services Information Services & Technology Topics for Today ● Introductions ● Basic Terminology ● How to get help ● Command-line vs. Scripting ● Variables ● Handling Arguments ● Standard I/O, Pipes, and Redirection ● Control Structures (loops and If statements) ● SCC Job Submission Example Research Computing Services Research Computing Services (RCS) A group within Information Services & Technology at Boston University provides computing, storage, and visualization resources and services to support research that has specialized or highly intensive computation, storage, bandwidth, or graphics requirements. Three Primary Services: ● Research Computation ● Research Visualization ● Research Consulting and Training Breadth of Research on the Shared Computing Cluster (SCC) Me ● Research Facilitator and Administrator ● Background in biomedical engineering, bioinformatics, and IT systems ● Offices on both CRC and BUMC ○ Most of our staff on the Charles River Campus, some dedicated to BUMC ● Contact: [email protected] You ● Who has experience programming? ● Using Linux? ● Using the Shared Computing Cluster (SCC)? Basic Terminology The Command-line The line on which commands are typed and passed to the shell. Username Hostname Current Directory [username@scc1 ~]$ Prompt Command Line (input) The Shell ● The interface between the user and the operating system ● Program that interprets and executes input ● Provides: ○ Built-in commands ○ Programming control structures ○ Environment
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?
    2015 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings May 19th, 11:45 AM An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference? Satyendra Gurjar Cyber Forensics Research and Education Group (UNHcFREG), Tagliatela College of Engineering, ECECS Department, University of New Haven, [email protected] Ibrahim Baggili Cyber Forensics Research and Education Group (UNHcFREG), Tagliatela College of Engineering, ECECS Department, University of New Haven Frank Breitinger CyberFollow F thisorensics and additional Research worksand Education at: https:/ Gr/commons.eroup (UNHcFREG),au.edu/adfsl Tagliatela College of Engineering, ECECS Depar Partment,t of the Univ Aviationersity ofSaf Newety and Hav Securityen Commons, Computer Law Commons, Defense and Security AliceStudies Fischer Commons , Forensic Science and Technology Commons, Information Security Commons, CyberNational For Securityensics Resear Law Commonsch and Education, OS and GrNetworksoup (UNHcFREG), Commons T, Otheragliatela Computer College Sciences of Engineering, Commons ECECS, and theDepar Socialtment, Contr Univol,ersity Law , ofCrime, New andHav enDe,viance AFischer@newha Commons ven.edu Scholarly Commons Citation Gurjar, Satyendra; Baggili, Ibrahim; Breitinger, Frank; and Fischer, Alice, "An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?" (2015). Annual ADFSL Conference on Digital Forensics, Security and Law. 6. https://commons.erau.edu/adfsl/2015/tuesday/6 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons.
    [Show full text]
  • Lecture 17 the Shell and Shell Scripting Simple Shell Scripts
    Lecture 17 The Shell and Shell Scripting In this lecture • The UNIX shell • Simple Shell Scripts • Shell variables • File System commands, IO commands, IO redirection • Command Line Arguments • Evaluating Expr in Shell • Predicates, operators for testing strings, ints and files • If-then-else in Shell • The for, while and do loop in Shell • Writing Shell scripts • Exercises In this course, we need to be familiar with the "UNIX shell". We use it, whether bash, csh, tcsh, zsh, or other variants, to start and stop processes, control the terminal, and to otherwise interact with the system. Many of you have heard of, or made use of "shell scripting", that is the process of providing instructions to shell in a simple, interpreted programming language . To see what shell we are working on, first SSH into unix.andrew.cmu.edu and type echo $SHELL ---- to see the working shell in SSH We will be writing our shell scripts for this particular shell (csh). The shell scripting language does not fit the classic definition of a useful language. It does not have many of the features such as portability, facilities for resource intensive tasks such as recursion or hashing or sorting. It does not have data structures like arrays and hash tables. It does not have facilities for direct access to hardware or good security features. But in many other ways the language of the shell is very powerful -- it has functions, conditionals, loops. It does not support strong data typing -- it is completely untyped (everything is a string). But, the real power of shell program doesn't come from the language itself, but from the diverse library that it can call upon -- any program.
    [Show full text]
  • CMSC 426/626 - Computer Security Fall 2014
    Authentication and Passwords CMSC 426/626 - Computer Security Fall 2014 Outline • Types of authentication • Vulnerabilities of password authentication • Linux password authentication • Windows Password authentication • Cracking techniques Goals of Authentication • Identification - provide a claimed identity to the system. • Verification - establish validity of the provided identity. We’re not talking about message authentication, e.g. the use of digital signatures. Means of Authentication • Something you know, e.g. password • Something you have, e.g. USB dongle or Common Access Card (CAC) • Something you are, e.g. fingerprint • Something you do, e.g. hand writing Password-Based Authentication • User provides identity and password; system verifies that the password is correct for the given identity. • Identity determines access and privileges. • Identity can be used for Discretionary Access Control, e.g. to give another user access to a file. Password Hashing Password • System stores hash of the user password, not the plain text password. Hash Algorithm • Commonly used technique, e.g. UNIX password hashing. Password Hash Password Vulnerabilities Assume the authentication system stores hashed passwords. There are eight attack strategies. • Off-line Dictionary Attack - get hold of the password file, test a collection (dictionary) of possible passwords. ‣ Most systems protect the password file, but attackers sometimes get hold of one. • Specific Account Attack - given a specific user account, try popular passwords. ‣ Most systems use lockout mechanisms to make these attacks difficult. • Popular Password Attack - given a popular password, try it on multiple accounts. ‣ Harder to defend against - have to look for patterns in failed access attempts. • Targeted Password Guessing - use what you know about a user to intelligently guess their password.
    [Show full text]
  • Jellyfish Count -M 21 -S 100M -T 10 -C Reads.Fasta
    Jellysh 2 User Guide December 13, 2013 Contents 1 Getting started 2 1.1 Counting all k-mers . .2 1.1.1 Counting k-mers in sequencing reads . .3 1.1.2 Counting k-mers in a genome . .3 1.2 Counting high-frequency k-mers . .3 1.2.1 One pass method . .3 1.2.2 Two pass method . .4 2 FAQ 5 2.1 How to read compressed les (or other format)?newmacroname . .5 2.2 How to read multiple les at once? . .5 2.3 How to reduce the output size? . .6 3 Subcommands 7 3.1 histo .............................................7 3.2 dump .............................................7 3.3 query .............................................7 3.4 info ..............................................8 3.5 merge ............................................8 3.6 cite . .8 1 Chapter 1 Getting started 1.1 Counting all k-mers The basic command to count all k-mers is as follows: jellyfish count -m 21 -s 100M -t 10 -C reads.fasta This will count canonical (-C) 21-mers (-m 21), using a hash with 100 million elements (-s 100 M) and 10 threads (-t 10) in the sequences in the le reads.fasta. The output is written in the le 'mer_counts.jf' by default (change with -o switch). To compute the histogram of the k-mer occurrences, use the histo subcommand (see section 3.1): jellyfish histo mer_counts.jf To query the counts of a particular k-mer, use the query subcommand (see section 3.3): jellyfish query mer_counts.jf AACGTTG To output all the counts for all the k-mers in the le, use the dump subcommand (see section 3.2): jellyfish dump mer_counts.jf > mer_counts_dumps.fa To get some information on how, when and where this jellysh le was generated, use the info subcommand (see section 3.4): jellyfish info mer_counts.jf For more detail information, see the relevant sections in this document.
    [Show full text]
  • A Fast Concurrent and Resizable Robin Hood Hash Table Endrias
    A Fast Concurrent and Resizable Robin Hood Hash Table by Endrias Kahssay Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY February 2021 © Massachusetts Institute of Technology 2021. All rights reserved. Author................................................................ Department of Electrical Engineering and Computer Science Jan 29, 2021 Certified by. Julian Shun Assistant Professor Thesis Supervisor Accepted by . Katrina LaCurts Chair, Master of Engineering Thesis Committee 2 A Fast Concurrent and Resizable Robin Hood Hash Table by Endrias Kahssay Submitted to the Department of Electrical Engineering and Computer Science on Jan 29, 2021, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract Concurrent hash tables are among the most important primitives in concurrent pro- gramming and have been extensively studied in the literature. Robin Hood hashing is a variant of linear probing that moves around keys to reduce probe distances. It has been used to develop state of the art serial hash tables. However, there is only one existing previous work on a concurrent Robin Hood table. The difficulty in making Robin Hood concurrent lies in the potential for large memory reorganization by the different table operations. This thesis presents Bolt, a concurrent resizable Robin Hood hash table engineered for high performance. Bolt treads an intricate balance between an atomic fast path and a locking slow path to facilitate concurrency. It uses a novel scheme to interleave the two without compromising correctness in the concur- rent setting.
    [Show full text]
  • Husky: Towards a More Efficient and Expressive Distributed Computing Framework
    Husky: Towards a More Efficient and Expressive Distributed Computing Framework Fan Yang Jinfeng Li James Cheng Department of Computer Science and Engineering The Chinese University of Hong Kong ffyang,jfli,[email protected] ABSTRACT tends Spark, and Gelly [3] extends Flink, to expose to programmers Finding efficient, expressive and yet intuitive programming models fine-grained control over the access patterns on vertices and their for data-parallel computing system is an important and open prob- communication patterns. lem. Systems like Hadoop and Spark have been widely adopted Over-simplified functional or declarative programming interfaces for massive data processing, as coarse-grained primitives like map with only coarse-grained primitives also limit the flexibility in de- and reduce are succinct and easy to master. However, sometimes signing efficient distributed algorithms. For instance, there is re- over-simplified API hinders programmers from more fine-grained cent interest in machine learning algorithms that compute by fre- control and designing more efficient algorithms. Developers may quently and asynchronously accessing and mutating global states have to resort to sophisticated domain-specific languages (DSLs), (e.g., some entries in a large global key-value table) in a fine-grained or even low-level layers like MPI, but this raises development cost— manner [14, 19, 24, 30]. It is not clear how to program such algo- learning many mutually exclusive systems prolongs the develop- rithms using only synchronous and coarse-grained operators (e.g., ment schedule, and the use of low-level tools may result in bug- map, reduce, and join), and even with immutable data abstraction prone programming.
    [Show full text]
  • Daniel Lyons [email protected] Why?
    How to Hurt Your Friends with (loop) Daniel Lyons [email protected] Why? Fast Powerful Widely-used Like format you can probably do more with it than you realize. Even though you hate it, you may have to read it in someone else’s code. On my machine, 578 of 1068 library files contain at least one loop form (54.12%). It’s fast as hell. loop as List Comprehension Python: [ f(x) for x in L if p(x) ] Haskell: [ f(x) | x <- L, p(x) ] Erlang: [ f(X) || X <- L, p(X) ]. Loop: (loop for x in L when (p x) collect (f x)) Things You Can Do With loop Variable initialization and stepping Value accumulation Conditional and unconditional execution Pre- and post-loop operations Termination whenever and however you like This is taken from the list of kinds of loop clauses from CLtL Ch. 26 - variable initialization and stepping - value accumulation - termination conditions - unconditional execution - conditional execution - miscellaneous operations Initialization for/as with repeat for and as mean the same thing with is a single ‘let’ statement repeat runs the loop a specified number of times for Is Really Complicated for var from expr to expr for var in expr for var on expr Of course from can also be downfrom or upfrom, and to can also be downto, upto, below or above for var in expr: Loops over every item in the list Optionally by some stepping function for var on expr loops over the cdrs of a list, giving you each successive sublist Loops over each sublist of the list, e.g.
    [Show full text]
  • Linux Command Line: Aliases, Prompts and Scripting
    Linux Command Line: Aliases, Prompts and Scri... 1 Linux Command Line: Aliases, Prompts and Scripting By Steven Gordon on Wed, 23/07/2014 - 7:46am Here are a few notes on using the Bash shell that I have used as a demo to students. It covers man pages, aliases, shell prompts, paths and basics of shell scripting. For details, see the many free manuals of Bash shell scripting. 1. Man Pages Man pages are the reference manuals for commands. Reading the man pages is best when you know the command to use, but cannot remember the syntax or options. Simply type man cmd and then read the manual. E.g.: student@netlab01:~$ man ls If you don't know which command to use to perform some task, then there is a basic search feature called apropos which will do a keyword search through an index of man page names and short descriptions. You can run it using either the command apropos or using man -k. E.g.: student@netlab01:~$ man superuser No manual entry for superuser student@netlab01:~$ apropos superuser su (1) - change user ID or become superuser student@netlab01:~$ man -k "new user" newusers (8) - update and create new users in batch useradd (8) - create a new user or update default new user information Some common used commands are actually not standalone program, but commands built-in to the shell. For example, below demonstrates the creation of aliases using alias. But there is no man page for alias. Instead, alias is described as part of the bash shell man page.
    [Show full text]
  • Intel Threading Building Blocks
    Praise for Intel Threading Building Blocks “The Age of Serial Computing is over. With the advent of multi-core processors, parallel- computing technology that was once relegated to universities and research labs is now emerging as mainstream. Intel Threading Building Blocks updates and greatly expands the ‘work-stealing’ technology pioneered by the MIT Cilk system of 15 years ago, providing a modern industrial-strength C++ library for concurrent programming. “Not only does this book offer an excellent introduction to the library, it furnishes novices and experts alike with a clear and accessible discussion of the complexities of concurrency.” — Charles E. Leiserson, MIT Computer Science and Artificial Intelligence Laboratory “We used to say make it right, then make it fast. We can’t do that anymore. TBB lets us design for correctness and speed up front for Maya. This book shows you how to extract the most benefit from using TBB in your code.” — Martin Watt, Senior Software Engineer, Autodesk “TBB promises to change how parallel programming is done in C++. This book will be extremely useful to any C++ programmer. With this book, James achieves two important goals: • Presents an excellent introduction to parallel programming, illustrating the most com- mon parallel programming patterns and the forces governing their use. • Documents the Threading Building Blocks C++ library—a library that provides generic algorithms for these patterns. “TBB incorporates many of the best ideas that researchers in object-oriented parallel computing developed in the last two decades.” — Marc Snir, Head of the Computer Science Department, University of Illinois at Urbana-Champaign “This book was my first introduction to Intel Threading Building Blocks.
    [Show full text]
  • The Xargs Package
    The xargs package Manuel Pégourié-Gonnard [email protected] v1.1 (2008/03/22) Contents 1 Introduction 1 2 Usage 1 3 Implementation 4 Important note for French users: a French version of the user documentation is included in the xargs-fr.pdf file. 1 Introduction A Defining commands with an optional argument is easy in LTEX2ε. There is, how- ever, two limitations: you can make only one argument optional and it must be the first one. The xargs package provide extended variants of \newcommand & friends, for which these limitations no longer hold: It is now easy to define commands with many (and freely placed) optional arguments, using a nice hkeyi=hvaluei syntax. For example, the following defines a command with two optional arguments. \newcommandx*\coord[3][1=1, 3=n]{(#2_{#1},\ldots,#2_{#3})} $\coord{x}$ (x1,...,xn) $\coord[0]{y}$ (y0,...,yn) $\coord{z}[m]$ (z1,...,zm) $\coord[0]{t}[m]$ (t0,...,tm) 2 Usage 2.1 Basics The xargs package defines an extended variant for every LATEX macro related to macro definition. xargs’s macro are named after their LATEX counterparts, just adding an x at end (see the list in the margin). Here is the complete list: \newcommandx \renewcommandx \newenvironmentx \renewenvironmentx \providecommandx \DeclareRobustCommandx \CheckCommandx 1 If you are not familiar with all of them, you can either just keep using the A commands you already know, or check Lamport’s book or the LTEX Companion (or any LATEX2ε manual) to learn the others. Since these commands all share the same syntax, I’ll always use \newcommandx in the following, but remember it works the same for all seven commands.
    [Show full text]