Winnowing: local algorithms for document fingerprinting
- S. Schleimer, D. Wilkerson, A. Aiken
- Computer ScienceACM SIGMOD Conference
- 9 June 2003
The class of local document fingerprinting algorithms is introduced, which seems to capture an essential property of any finger-printing technique guaranteed to detect copies, and a novel lower bound on the performance of any local algorithm is proved.
Scalable statistical bug isolation
- B. Liblit, M. Naik, A. Zheng, A. Aiken, Michael I. Jordan
- Computer ScienceACM-SIGPLAN Symposium on Programming Language…
- 12 June 2005
A statistical debugging algorithm that isolates bugs in programs containing multiple undiagnosed bugs and identifies predictors that are associated with individual bugs that reveal both the circumstances under which bugs occur as well as the frequencies of failure modes, making it easier to prioritize debugging efforts.
Legion: Expressing locality and independence with logical regions
- Michael Bauer, Sean Treichler, Elliott Slaughter, A. Aiken
- Computer ScienceInternational Conference for High Performance…
- 10 November 2012
A runtime system that dynamically extracts parallelism from Legion programs, using a distributed, parallel scheduling algorithm that identifies both independent tasks and nested parallelism.
Bug isolation via remote program sampling
- B. Liblit, A. Aiken, A. Zheng, Michael I. Jordan
- Computer ScienceACM-SIGPLAN Symposium on Programming Language…
- 9 June 2003
A low-overhead sampling infrastructure for gathering information from the executions experienced by a program's user community is proposed and statistical modeling based on logistic regression allows us to identify program behaviors that are strongly correlated with failure and are therefore likely places to look for the error.
Effective static race detection for Java
We present a novel technique for static race detection in Java programs, comprised of a series of stages that employ a combination of static analyses to successively reduce the pairs of memory…
Sequoia: Programming the Memory Hierarchy
- K. Fatahalian, D. Horn, P. Hanrahan
- Computer ScienceInternational Conference on Software Composition
- 11 November 2006
This work has implemented a complete programming system, including a compiler and runtime systems for cell processor-based blade systems and distributed memory clusters, and demonstrates efficient performance running Sequoia programs on both of these platforms.
Titanium: A High-performance Java Dialect
- K. Yelick, L. Semenzato, A. Aiken
- Computer ScienceConcurrency Practice and Experience
- 1 September 1998
This work discusses the main additions to Java are immutable classes, multidimensional arrays, an explicitly parallel SPMD model of computation with a global address space, and zone-based memory management, and reports progress on the development of Titanium.
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
- D. Wagner, J. Foster, E. Brewer, A. Aiken
- Computer ScienceNetwork and Distributed System Security Symposium
- 2000
The design and prototype of a new technique for finding potential buffer overrun vulnerabilities in security-critical C code are implemented and used to find new remotely-exploitable vulnerabilities in a large, widely deployed software package.
Beyond Data and Model Parallelism for Deep Neural Networks
- Zhihao Jia, M. Zaharia, A. Aiken
- Computer ScienceConference on Machine Learning and Systems
- 14 July 2018
A more comprehensive search space of parallelization strategies for DNNs called SOAP, which includes strategies to parallelize a DNN in the Sample, Operation, Attribute, and Parameter dimensions is defined and FlexFlow, a deep learning framework that uses guided randomized search of the SOAP space to find a fast parallelization strategy for a specific parallel machine is proposed.
Static Detection of Security Vulnerabilities in Scripting Languages
- Yichen Xie, A. Aiken
- Computer ScienceUSENIX Security Symposium
- 31 July 2006
A static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications, is presented, finding 105 previously unknown security vulnerabilities, most of which it believes are remotely exploitable.
...
...