6 research outputs found
EnergAt: Fine-Grained Energy Attribution for Multi-Tenancy
In the post-Moore's Law era, relying solely on hardware advancements for
automatic performance gains is no longer feasible without increased energy
consumption, due to the end of Dennard scaling. Consequently, computing
accounts for an increasing amount of global energy usage, contradicting the
objective of sustainable computing. The lack of hardware support and the
absence of a standardized, software-centric method for the precise tracing of
energy provenance exacerbates the issue. Aiming to overcome this challenge, we
argue that fine-grained software energy attribution is attainable, even with
limited hardware support. To support our position, we present a thread-level,
NUMA-aware energy attribution method for CPU and DRAM in multi-tenant
environments. The evaluation of our prototype implementation, EnergAt,
demonstrates the validity, effectiveness, and robustness of our theoretical
model, even in the presence of the noisy-neighbor effect. We envisage a
sustainable cloud environment and emphasize the importance of collective
efforts to improve software energy efficiency.Comment: 8 pages, 4 figures; Published in HotCarbon 2023; Artifact available
at https://github.com/HongyuHe/energa
HasTEE: Programming Trusted Execution Environments with Haskell
Trusted Execution Environments (TEEs) are hardware-enforced memory isolation
units, emerging as a pivotal security solution for security-critical
applications. TEEs, like Intel SGX and ARM TrustZone, allow the isolation of
confidential code and data within an untrusted host environment, such as the
cloud and IoT. Despite strong security guarantees, TEE adoption has been
hindered by an awkward programming model. This model requires manual
application partitioning and the use of error-prone, memory-unsafe, and
potentially information-leaking low-level C/C++ libraries.
We address the above with \textit{HasTEE}, a domain-specific language (DSL)
embedded in Haskell for programming TEE applications. HasTEE includes a port of
the GHC runtime for the Intel-SGX TEE. HasTEE uses Haskell's type system to
automatically partition an application and to enforce \textit{Information Flow
Control} on confidential data. The DSL, being embedded in Haskell, allows for
the usage of higher-order functions, monads, and a restricted set of I/O
operations to write any standard Haskell application. Contrary to previous
work, HasTEE is lightweight, simple, and is provided as a \emph{simple security
library}; thus avoiding any GHC modifications. We show the applicability of
HasTEE by implementing case studies on federated learning, an encrypted
password wallet, and a differentially-private data clean room.Comment: To appear in Haskell Symposium 202
Retrofitting OCaml modules: Fixing signature avoidance in the generative case
International audienceML modules are offer large-scale notions of composition and modularity. Provided as an additional layer on top of the core language, they have proven both vital to the working OCaml and SML programmers, and inspiring to other use-cases and languages. Unfortunately, their meta-theory remains difficult to comprehend, requiring heavy machinery to prove their soundness. Building on a previous translation from ML modules to Fω , we propose a new comprehensive description of a generative subset of OCaml modules, embarking on a journey right from the source OCaml module system, up to Fω , and back. We pause in the middle to uncover a system, called canonical that combines the best of both worlds. On the way, we obtain type soundness, but also and more importantly, a deeper insight into the signature avoidance problem, along with ways to improve both the OCaml language and its typechecking algorithm
Applied and Computational Statistics
Research without statistics is like water in the sand; the latter is necessary to reap the benefits of the former. This collection of articles is designed to bring together different approaches to applied statistics. The studies presented in this book are a tiny piece of what applied statistics means and how statistical methods find their usefulness in different fields of research from theoretical frames to practical applications such as genetics, computational chemistry, and experimental design. This book presents several applications of the statistics: A new continuous distribution with five parameters—the modified beta Gompertz distribution; A method to calculate the p-value associated with the Anderson–Darling statistic; An approach of repeated measurement designs; A validated model to predict statement mutations score; A new family of structural descriptors, called the extending characteristic polynomial (EChP) family, used to express the link between the structure of a compound and its properties. This collection brings together authors from Europe and Asia with a specific contribution to the knowledge in regards to theoretical and applied statistics