Committee: Dr. Mark Hill (Advisor)
Dr. David Wood (Advisor)
Dr. Dan Negrut
Dr. Jignesh Patel
Dr. Karu Sankaralingam
Friday, October 24, 2014 - 10:00am to 12:00pmJason PowerUW-Madison
Committee: Dr. Mark Hill (Advisor)
Monday, October 27, 2014 - 12:15pm to 1:15pmKarthik RamachandraMicrosoft
Queries containing user-defined functions (UDFs) are widely used, since they allow queries to be written using a mix of imperative language constructs and SQL, thereby increasing the expressive power of SQL; further, they encourage modularity, and make queries easier to understand. However, not much attention has been paid to their optimization, except for simple UDFs without imperative constructs. Queries invoking UDFs with imperative constructs are executed using iterative invocation of the UDFs, leading to poor performance, especially if the UDF contains queries.
Computational Biology Seminar: Ultrastructural analysis of sleep deprived brain tissue using automated image segmentation techniquesTuesday, October 28, 2014 - 4:00pm to 5:00pmKurt Weiss, CIBM Postdoctoral FellowDepartment of Psychiatry, UW-Madison
While sleep behavior (reduced activity and a decreased arousal threshold) is present in all species that have been assayed, its biological function remains unclear. The synaptic homeostasis hypothesis of sleep suggests that in a waking state, synaptic potentiation continually occurs as a result of learning and memory formation and sleep is needed to curtail this process by reducing ancillary synaptic connections. We are using serial block-face scanning electron microscopy (SBF-SEM) to assay ultrastructural changes in the brains of sleep deprived and rested rodents and flies.
Wednesday, October 29, 2014 - 4:00pm to 5:00pmDharma RajanVMWare
Server Virtualization has proven to be the base for Data Centers virtualization globally. Software Defined Networking is redefining the networking landscape with Network Virtualization. This talk will provide an overview of Network virtualization platform, how logical networking at Layer 2, Layer 3, micro-segmentation is causing Enterprise IT transformation from traditional networking to next generation virtualized Software Defined Data networks.
Chen-Han Ho Ph.D Final Oral Defense: Mechanisms Towards Energy-Efficient Dynamic Hardware SpecializationThursday, October 30, 2014 - 9:00am to 11:00amChen-Han HoUW-Madison
Committee: Dr. Karu Sankaralingam (Advisor)
Dr. Guri Sohi,
Dr. Mark Hill
Dr. David Wood
Dr. Nam Sung Kim
Monday, November 3, 2014 - 1:00pmSeeun William UmbohUW-Madison
We develop a new approach for online network design and obtain improved competitive ratios for several problems. Our approach gives natural deterministic algorithms and simple analyses. At the heart of our work is a novel application of embeddings into hierarchically well-separated trees (HSTs) to the analysis of online network design algorithms — we charge the cost of the algorithm to the cost of the optimal solution on any HST embedding of the terminals. This analysis technique is widely applicable to many problems and gives a unified framework for online network design.
Tuesday, November 4, 2014 - 4:00pm to 5:00pmMatthew WatkinsBucknell University
Wednesday, November 5, 2014 - 7:00pmRaissa D'SouzaUC-Davis, Department of Aerospace & Mechanical Engineering
The Center for Complexity and Collective Computation (C4) at WID presents the John von Neumann Public Lecture Series in Complexity and Computation, featuring Raissa D'Souza from the Department of Aerospace & Mechanical Engineering at the University of California-Davis. D'Souza will lead a talk titled, “The Science of Networks: Modeling Our Complex, Interdependent World.”
Monday, November 10, 2014 - 1:00pm to 2:00pmPranjal AwasthiPrinceton University
We study the problem of learning halfspaces in the malicious noise model of Valiant. In this model, an adversary can corrupt an η fraction of both the label part and the feature part of an example. We design a polynomial-time algorithm for learning halfspaces in R^d under the uniform distribution with near optimal noise tolerance.
Our results also imply the first active learning algorithm for learning halfspaces that can handle malicious noise.
Joint work with Nina Balcan and Phil Long.
Monday, November 10, 2014 - 4:00pmProf. Krishna V. PalemRice University
Well over a decade ago, many believed that an engine of growth driving the semiconductor and computing industries, captured nicely by Gordon Moore’s remarkable prophecy (Moore’s law), was speeding towards a dangerous cliff-edge. Ranging from expression of concern to doomsday scenarios, the exact time when serious hurdles would beset us varied quite a bit—some of the more optimistic warnings giving Moore’s law till 2020!
Tuesday, November 11, 2014 - 4:00pmMark D. Hill & David WoodUniversity of Wisconsin-Madison
Graphics Processing Units (GPUs) are being re-purposed to perform general-purpose computations as they offer the potential for better performance and and lower energy than conventional CPUs for some workloads. Effective use of GPGPUs, however often requires the programmer and/or runtime software to explicitly manage the logical name (address) and/or physical location of data. It is our hypothesis--shared by some--that GPGPUs can be made more generally effective if all CPU-GPU program threads can access data via a uniform virtual address backed by hardware data movement support.
Wednesday, November 26, 2014 - 12:00pm to 1:00pmVeljko M. MilutinovicUniversity of Belgrade
This presentation analyses the essence of DataFlow SuperComputing, defines its advantages and sheds light on the related programming model. DataFlow computers, compared to ControlFlow computers, offer speedups of 20 to 200 (even 2000 for some applications), power reductions of about 20, and size reductions of also about 20. However, the programming paradigm is different, and has to be mastered. The talk explains the paradigm, using Maxeler as an example, and sheds light on the ongoing research in the field. Examples include Physics, Engineering, DataMining, FinancialAnalytics, etc.
Tuesday, December 2, 2014 - 4:00pmHadi Esmaeilzadeh
Tuesday, December 9, 2014 - 4:00pm to 5:00pmJayneel GandhiUW Madison
Virtualization provides value for many workloads, but its cost rises for workloads with poor memory access locality. This overhead comes from translation lookaside buffer (TLB) misses where the hardware performs a 2D page walk (up to 24 memory references on x86-64) rather than a native TLB miss (up to only 4 memory references). The first dimension translates guest virtual addresses to guest physical addresses, while the second translates guest physical addresses to host physical addresses.
Thursday, January 29, 2015 - 4:00pm to 5:00pmBen BedersonUniversity of Maryland, College Park