3,358 research outputs found
Revisiting the Equivalence Problem for Finite Multitape Automata
The decidability of determining equivalence of deterministic multitape
automata (or transducers) was a longstanding open problem until it was resolved
by Harju and Karhum\"{a}ki in the early 1990s. Their proof of decidability
yields a co_NP upper bound, but apparently not much more is known about the
complexity of the problem. In this paper we give an alternative proof of
decidability, which follows the basic strategy of Harju and Karhumaki but
replaces their use of group theory with results on matrix algebras. From our
proof we obtain a simple randomised algorithm for deciding language equivalence
of deterministic multitape automata and, more generally, multiplicity
equivalence of nondeterministic multitape automata. The algorithm involves only
matrix exponentiation and runs in polynomial time for each fixed number of
tapes. If the two input automata are inequivalent then the algorithm outputs a
word on which they differ
Exposing errors related to weak memory in GPU applications
© 2016 ACM.We present the systematic design of a testing environment that uses stressing and fuzzing to reveal errors in GPU applications that arise due to weak memory effects. We evaluate our approach on seven GPUS spanning three NVIDIA architectures, across ten CUDA applications that use fine-grained concurrency. Our results show that applications that rarely or never exhibit errors related to weak memory when executed natively can readily exhibit these errors when executed in our testing environment. Our testing environment also provides a means to help identify the root causes of such errors, and automatically suggests how to insert fences that harden an application against weak memory bugs. To understand the cost of GPU fences, we benchmark applications with fences provided by the hardening strategy as well as a more conservative, sound fencing strategy
Retention or defection? Chinese consumers’ decision-making styles for domestic and global brands
This study explores consumers’ decision-making in terms of intention to switch to foreign brands from domestic brands when purchasing cell phones and sports shoes. A survey of 584 undergraduates in Guangdong, China, shows that domestic brands retain their low quality-conscious, low fashion-and-recreational-conscious and low price-conscious customers and attract low brand-conscious and high choice-confused buyers from foreign brands. Foreign brands typically retain their consumers who are highly conscious of fashion and recreation and keep and draw customers with low choice confusion. High-price-conscious consumers and those who are highly brand-confused will assess foreign and domestic brands when searching for bargains. Regarding managerial implications, local brands should offer products of high quality at low prices
and constantly invest in R&D; foreign brands may expand their customer bases and build interactive brand channels; all companies can retain brand-confused customers with preferential packages and design their marketing strategies based on decision-making styles of their target consumers
Remarks on NonHamiltonian Statistical Mechanics: Lyapunov Exponents and Phase-Space Dimensionality Loss
The dissipation associated with nonequilibrium flow processes is reflected by
the formation of strange attractor distributions in phase space. The
information dimension of these attractors is less than that of the equilibrium
phase space, corresponding to the extreme rarity of nonequilibrium states. Here
we take advantage of a simple model for heat conduction to demonstrate that the
nonequilibrium dimensionality loss can definitely exceed the number of
phase-space dimensions required to thermostat an otherwise Hamiltonian system.Comment: 5 pages, 2 figures, minor typos correcte
Uniform tiling with electrical resistors
The electric resistance between two arbitrary nodes on any infinite lattice
structure of resistors that is a periodic tiling of space is obtained. Our
general approach is based on the lattice Green's function of the Laplacian
matrix associated with the network. We present several non-trivial examples to
show how efficient our method is. Deriving explicit resistance formulas it is
shown that the Kagom\'e, the diced and the decorated lattice can be mapped to
the triangular and square lattice of resistors. Our work can be extended to the
random walk problem or to electron dynamics in condensed matter physics.Comment: 22 pages, 14 figure
Cooperative kernels: GPU multitasking for blocking algorithms
There is growing interest in accelerating irregular data-parallel algorithms on GPUs. These algorithms are typically blocking , so they require fair scheduling. But GPU programming models (e.g. OpenCL) do not mandate fair scheduling, and GPU schedulers are unfair in practice. Current approaches avoid this issue by exploit- ing scheduling quirks of today’s GPUs in a manner that does not allow the GPU to be shared with other workloads (such as graphics rendering tasks). We propose cooperative kernels , an extension to the traditional GPU programming model geared towards writing blocking algorithms. Workgroups of a cooperative kernel are fairly scheduled, and multitasking is supported via a small set of language extensions through which the kernel and scheduler cooperate. We describe a prototype implementation of a cooperative kernel frame- work implemented in OpenCL 2.0 and evaluate our approach by porting a set of blocking GPU applications to cooperative kernels and examining their performance under multitasking
Security properties of two authenticated conference key agreement protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme su#ers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still su#ers from insider attacks (which are not covered by the security model used by Katz and Yung)
Suppression of core polarization in halo nuclei
We present a microscopic study of halo nuclei, starting from the Paris and
Bonn potentials and employing a two-frequency shell model approach. It is found
that the core-polarization effect is dramatically suppressed in such nuclei.
Consequently the effective interaction for halo nucleons is almost entirely
given by the bare G-matrix alone, which presently can be evaluated with a high
degree of accuracy. The experimental pairing energies between the two halo
neutrons in He and Li nuclei are satisfactorily reproduced by our
calculation. It is suggested that the fundamental nucleon-nucleon interaction
can be probed in a clearer and more direct way in halo nuclei than in ordinary
nuclei.Comment: 11 pages, RevTex, 2 postscript figures; major revisions, matches
version to appear in Phys. Rev. Letter
Recommended from our members
Containment and equivalence of weighted automata: Probabilistic and max-plus cases
This paper surveys some results regarding decision problems for probabilistic and max-plus automata, such as containment and equivalence. Probabilistic and max-plus automata are part of the general family of weighted automata, whose semantics are maps from words to real values. Given two weighted automata, the equivalence problem asks whether their semantics are the same, and the containment problem whether one is point-wise smaller than the other one. These problems have been studied intensively and this paper will review some techniques used to show (un)decidability and state a list of open questions that still remain
- …