3,358 research outputs found

    Revisiting the Equivalence Problem for Finite Multitape Automata

    Full text link
    The decidability of determining equivalence of deterministic multitape automata (or transducers) was a longstanding open problem until it was resolved by Harju and Karhum\"{a}ki in the early 1990s. Their proof of decidability yields a co_NP upper bound, but apparently not much more is known about the complexity of the problem. In this paper we give an alternative proof of decidability, which follows the basic strategy of Harju and Karhumaki but replaces their use of group theory with results on matrix algebras. From our proof we obtain a simple randomised algorithm for deciding language equivalence of deterministic multitape automata and, more generally, multiplicity equivalence of nondeterministic multitape automata. The algorithm involves only matrix exponentiation and runs in polynomial time for each fixed number of tapes. If the two input automata are inequivalent then the algorithm outputs a word on which they differ

    Exposing errors related to weak memory in GPU applications

    Get PDF
    © 2016 ACM.We present the systematic design of a testing environment that uses stressing and fuzzing to reveal errors in GPU applications that arise due to weak memory effects. We evaluate our approach on seven GPUS spanning three NVIDIA architectures, across ten CUDA applications that use fine-grained concurrency. Our results show that applications that rarely or never exhibit errors related to weak memory when executed natively can readily exhibit these errors when executed in our testing environment. Our testing environment also provides a means to help identify the root causes of such errors, and automatically suggests how to insert fences that harden an application against weak memory bugs. To understand the cost of GPU fences, we benchmark applications with fences provided by the hardening strategy as well as a more conservative, sound fencing strategy

    Retention or defection? Chinese consumers’ decision-making styles for domestic and global brands

    Get PDF
    This study explores consumers’ decision-making in terms of intention to switch to foreign brands from domestic brands when purchasing cell phones and sports shoes. A survey of 584 undergraduates in Guangdong, China, shows that domestic brands retain their low quality-conscious, low fashion-and-recreational-conscious and low price-conscious customers and attract low brand-conscious and high choice-confused buyers from foreign brands. Foreign brands typically retain their consumers who are highly conscious of fashion and recreation and keep and draw customers with low choice confusion. High-price-conscious consumers and those who are highly brand-confused will assess foreign and domestic brands when searching for bargains. Regarding managerial implications, local brands should offer products of high quality at low prices and constantly invest in R&D; foreign brands may expand their customer bases and build interactive brand channels; all companies can retain brand-confused customers with preferential packages and design their marketing strategies based on decision-making styles of their target consumers

    Remarks on NonHamiltonian Statistical Mechanics: Lyapunov Exponents and Phase-Space Dimensionality Loss

    Full text link
    The dissipation associated with nonequilibrium flow processes is reflected by the formation of strange attractor distributions in phase space. The information dimension of these attractors is less than that of the equilibrium phase space, corresponding to the extreme rarity of nonequilibrium states. Here we take advantage of a simple model for heat conduction to demonstrate that the nonequilibrium dimensionality loss can definitely exceed the number of phase-space dimensions required to thermostat an otherwise Hamiltonian system.Comment: 5 pages, 2 figures, minor typos correcte

    Uniform tiling with electrical resistors

    Get PDF
    The electric resistance between two arbitrary nodes on any infinite lattice structure of resistors that is a periodic tiling of space is obtained. Our general approach is based on the lattice Green's function of the Laplacian matrix associated with the network. We present several non-trivial examples to show how efficient our method is. Deriving explicit resistance formulas it is shown that the Kagom\'e, the diced and the decorated lattice can be mapped to the triangular and square lattice of resistors. Our work can be extended to the random walk problem or to electron dynamics in condensed matter physics.Comment: 22 pages, 14 figure

    Cooperative kernels: GPU multitasking for blocking algorithms

    Get PDF
    There is growing interest in accelerating irregular data-parallel algorithms on GPUs. These algorithms are typically blocking , so they require fair scheduling. But GPU programming models (e.g. OpenCL) do not mandate fair scheduling, and GPU schedulers are unfair in practice. Current approaches avoid this issue by exploit- ing scheduling quirks of today’s GPUs in a manner that does not allow the GPU to be shared with other workloads (such as graphics rendering tasks). We propose cooperative kernels , an extension to the traditional GPU programming model geared towards writing blocking algorithms. Workgroups of a cooperative kernel are fairly scheduled, and multitasking is supported via a small set of language extensions through which the kernel and scheduler cooperate. We describe a prototype implementation of a cooperative kernel frame- work implemented in OpenCL 2.0 and evaluate our approach by porting a set of blocking GPU applications to cooperative kernels and examining their performance under multitasking

    Security properties of two authenticated conference key agreement protocols

    Get PDF
    In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme su#ers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still su#ers from insider attacks (which are not covered by the security model used by Katz and Yung)

    Suppression of core polarization in halo nuclei

    Get PDF
    We present a microscopic study of halo nuclei, starting from the Paris and Bonn potentials and employing a two-frequency shell model approach. It is found that the core-polarization effect is dramatically suppressed in such nuclei. Consequently the effective interaction for halo nucleons is almost entirely given by the bare G-matrix alone, which presently can be evaluated with a high degree of accuracy. The experimental pairing energies between the two halo neutrons in 6^6He and 11^{11}Li nuclei are satisfactorily reproduced by our calculation. It is suggested that the fundamental nucleon-nucleon interaction can be probed in a clearer and more direct way in halo nuclei than in ordinary nuclei.Comment: 11 pages, RevTex, 2 postscript figures; major revisions, matches version to appear in Phys. Rev. Letter
    • …
    corecore