Zum Hauptinhalt springen

Showing 1–29 of 29 results for author: Bennett, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.16176  [pdf, ps, other

    cs.DS

    Matrix Multiplication Verification Using Coding Theory

    Authors: Huck Bennett, Karthik Gajulapalli, Alexander Golovnev, Evelyn Warton

    Abstract: We study the Matrix Multiplication Verification Problem (MMV) where the goal is, given three $n \times n$ matrices $A$, $B$, and $C$ as input, to decide whether $AB = C$. A classic randomized algorithm by Freivalds (MFCS, 1979) solves MMV in $\widetilde{O}(n^2)$ time, and a longstanding challenge is to (partially) derandomize it while still running in faster than matrix multiplication time (i.e.,… ▽ More

    Submitted 20 July, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: RANDOM 2024

  2. arXiv:2308.04609  [pdf, other

    cs.CG

    Topological $k$-metrics

    Authors: Willow Barkan-Vered, Huck Bennett, Amir Nayyeri

    Abstract: Metric spaces $(X, d)$ are ubiquitous objects in mathematics and computer science that allow for capturing (pairwise) distance relationships $d(x, y)$ between points $x, y \in X$. Because of this, it is natural to ask what useful generalizations there are of metric spaces for capturing "$k$-wise distance relationships" $d(x_1, \ldots, x_k)$ among points $x_1, \ldots, x_k \in X$ for $k > 2$. To tha… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  3. arXiv:2211.11693  [pdf, other

    cs.CC cs.CR cs.DS

    Lattice Problems Beyond Polynomial Time

    Authors: Divesh Aggarwal, Huck Bennett, Zvika Brakerski, Alexander Golovnev, Rajendra Kumar, Zeyong Li, Spencer Peters, Noah Stephens-Davidowitz, Vinod Vaikuntanathan

    Abstract: We study the complexity of lattice problems in a world where algorithms, reductions, and protocols can run in superpolynomial time, revisiting four foundational results: two worst-case to average-case reductions and two protocols. We also show a novel protocol. 1. We prove that secret-key cryptography exists if $\widetilde{O}(\sqrt{n})$-approximate SVP is hard for $2^{\varepsilon n}$-time algori… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  4. arXiv:2211.07900  [pdf, ps, other

    cs.CC

    Parameterized Inapproximability of the Minimum Distance Problem over all Fields and the Shortest Vector Problem in all $\ell_p$ Norms

    Authors: Huck Bennett, Mahdi Cheraghchi, Venkatesan Guruswami, João Ribeiro

    Abstract: We prove that the Minimum Distance Problem (MDP) on linear codes over any fixed finite field and parameterized by the input distance bound is W[1]-hard to approximate within any constant factor. We also prove analogous results for the parameterized Shortest Vector Problem (SVP) on integer lattices. Specifically, we prove that SVP in the $\ell_p$ norm is W[1]-hard to approximate within any constant… ▽ More

    Submitted 26 February, 2024; v1 submitted 15 November, 2022; originally announced November 2022.

    Comments: 40 pages. Revised exposition. To appear at SICOMP. Short conference version in STOC 2023

  5. arXiv:2202.07736  [pdf, ps, other

    cs.CC

    Hardness of the (Approximate) Shortest Vector Problem: A Simple Proof via Reed-Solomon Codes

    Authors: Huck Bennett, Chris Peikert

    Abstract: $\newcommand{\NP}{\mathsf{NP}}\newcommand{\GapSVP}{\textrm{GapSVP}}$We give a simple proof that the (approximate, decisional) Shortest Vector Problem is $\NP$-hard under a randomized reduction. Specifically, we show that for any $p \geq 1$ and any constant $γ< 2^{1/p}$, the $γ$-approximate problem in the $\ell_p$ norm ($γ$-$\GapSVP_p$) is not in $\mathsf{RP}$ unless $\NP \subseteq \mathsf{RP}… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  6. arXiv:2111.11516  [pdf

    cond-mat.mes-hall cs.NE

    Shape-Dependent Multi-Weight Magnetic Artificial Synapses for Neuromorphic Computing

    Authors: Thomas Leonard, Samuel Liu, Mahshid Alamdar, Can Cui, Otitoaleke G. Akinola, Lin Xue, T. Patrick Xiao, Joseph S. Friedman, Matthew J. Marinella, Christopher H. Bennett, Jean Anne C. Incorvia

    Abstract: In neuromorphic computing, artificial synapses provide a multi-weight conductance state that is set based on inputs from neurons, analogous to the brain. Additional properties of the synapse beyond multiple weights can be needed, and can depend on the application, requiring the need for generating different synapse behaviors from the same materials. Here, we measure artificial synapses based on ma… ▽ More

    Submitted 17 February, 2022; v1 submitted 22 November, 2021; originally announced November 2021.

    Comments: 27 pages 6 figures 1 table

  7. arXiv:2109.04025  [pdf, other

    cs.CC cs.CR cs.DS

    Improved Hardness of BDD and SVP Under Gap-(S)ETH

    Authors: Huck Bennett, Chris Peikert, Yi Tang

    Abstract: We show improved fine-grained hardness of two key lattice problems in the $\ell_p$ norm: Bounded Distance Decoding to within an $α$ factor of the minimum distance ($\mathrm{BDD}_{p, α}$) and the (decisional) $γ$-approximate Shortest Vector Problem ($\mathrm{SVP}_{p,γ}$), assuming variants of the Gap (Strong) Exponential Time Hypothesis (Gap-(S)ETH). Specifically, we show: 1. For all… ▽ More

    Submitted 25 January, 2022; v1 submitted 8 September, 2021; originally announced September 2021.

    Comments: ITCS 2022

  8. On the Accuracy of Analog Neural Network Inference Accelerators

    Authors: T. Patrick Xiao, Ben Feinberg, Christopher H. Bennett, Venkatraman Prabhakar, Prashant Saxena, Vineet Agrawal, Sapan Agarwal, Matthew J. Marinella

    Abstract: Specialized accelerators have recently garnered attention as a method to reduce the power consumption of neural network inference. A promising category of accelerators utilizes nonvolatile memory arrays to both store weights and perform $\textit{in situ}$ analog computation inside the array. While prior work has explored the design space of analog accelerators to optimize performance and energy ef… ▽ More

    Submitted 3 February, 2022; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Changes in v3: modified definition of state-independent error (factor of 2) for fairer comparison to state-proportional. Added more results on INT4 network

    Journal ref: IEEE Circuits and Systems Magazine, vol. 22, no. 4, pp. 26-48, 2022

  9. arXiv:2107.02238  [pdf, other

    cs.NE cond-mat.dis-nn eess.SP

    High-Speed CMOS-Free Purely Spintronic Asynchronous Recurrent Neural Network

    Authors: Pranav O. Mathews, Christian B. Duffee, Abel Thayil, Ty E. Stovall, Christopher H. Bennett, Felipe Garcia-Sanchez, Matthew J. Marinella, Jean Anne C. Incorvia, Naimul Hassan, Xuan Hu, Joseph S. Friedman

    Abstract: Neuromorphic computing systems overcome the limitations of traditional von Neumann computing architectures. These computing systems can be further improved upon by using emerging technologies that are more efficient than CMOS for neural computation. Recent research has demonstrated memristors and spintronic devices in various neural network designs boost efficiency and speed. This paper presents a… ▽ More

    Submitted 30 September, 2022; v1 submitted 5 July, 2021; originally announced July 2021.

  10. arXiv:2101.03095  [pdf

    cond-mat.mes-hall cs.ET cs.NE physics.app-ph

    Controllable reset behavior in domain wall-magnetic tunnel junction artificial neurons for task-adaptable computation

    Authors: Samuel Liu, Christopher H. Bennett, Joseph S. Friedman, Matthew J. Marinella, David Paydarfar, Jean Anne C. Incorvia

    Abstract: Neuromorphic computing with spintronic devices has been of interest due to the limitations of CMOS-driven von Neumann computing. Domain wall-magnetic tunnel junction (DW-MTJ) devices have been shown to be able to intrinsically capture biological neuron behavior. Edgy-relaxed behavior, where a frequently firing neuron experiences a lower action potential threshold, may provide additional artificial… ▽ More

    Submitted 8 January, 2021; originally announced January 2021.

    Comments: 5 pages, 5 figures

  11. arXiv:2011.06075  [pdf

    cs.NE cond-mat.mes-hall cs.ET physics.app-ph

    Domain Wall Leaky Integrate-and-Fire Neurons with Shape-Based Configurable Activation Functions

    Authors: Wesley H. Brigner, Naimul Hassan, Xuan Hu, Christopher H. Bennett, Felipe Garcia-Sanchez, Can Cui, Alvaro Velasquez, Matthew J. Marinella, Jean Anne C. Incorvia, Joseph S. Friedman

    Abstract: Complementary metal oxide semiconductor (CMOS) devices display volatile characteristics, and are not well suited for analog applications such as neuromorphic computing. Spintronic devices, on the other hand, exhibit both non-volatile and analog features, which are well-suited to neuromorphic computing. Consequently, these novel devices are at the forefront of beyond-CMOS artificial intelligence ap… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

  12. arXiv:2007.09599  [pdf, ps, other

    cs.GT cs.DS math.PR

    Reconstructing weighted voting schemes from partial information about their power indices

    Authors: Huck Bennett, Anindya De, Rocco A. Servedio, Emmanouil-Vasileios Vlatakis-Gkaragkounis

    Abstract: A number of recent works [Goldberg 2006; O'Donnell and Servedio 2011; De, Diakonikolas, and Servedio 2017; De, Diakonikolas, Feldman, and Servedio 2014] have considered the problem of approximately reconstructing an unknown weighted voting scheme given information about various sorts of ``power indices'' that characterize the level of control that individual voters have over the final outcome. In… ▽ More

    Submitted 26 July, 2020; v1 submitted 19 July, 2020; originally announced July 2020.

  13. arXiv:2004.00802  [pdf

    cs.NE

    Device-aware inference operations in SONOS nonvolatile memory arrays

    Authors: Christopher H. Bennett, T. Patrick Xiao, Ryan Dellana, Vineet Agrawal, Ben Feinberg, Venkatraman Prabhakar, Krishnaswamy Ramkumar, Long Hinh, Swatilekha Saha, Vijay Raghavan, Ramesh Chettuvetty, Sapan Agarwal, Matthew J. Marinella

    Abstract: Non-volatile memory arrays can deploy pre-trained neural network models for edge inference. However, these systems are affected by device-level noise and retention issues. Here, we examine damage caused by these effects, introduce a mitigation strategy, and demonstrate its use in fabricated array of SONOS (Silicon-Oxide-Nitride-Oxide-Silicon) devices. On MNIST, fashion-MNIST, and CIFAR-10 tasks, o… ▽ More

    Submitted 2 April, 2020; originally announced April 2020.

    Comments: To be presented at IEEE International Physics Reliability Symposium (IRPS) 2020

  14. arXiv:2003.11120  [pdf, other

    cs.NE cs.ET physics.app-ph

    Unsupervised Competitive Hardware Learning Rule for Spintronic Clustering Architecture

    Authors: Alvaro Velasquez, Christopher H. Bennett, Naimul Hassan, Wesley H. Brigner, Otitoaleke G. Akinola, Jean Anne C. Incorvia, Matthew J. Marinella, Joseph S. Friedman

    Abstract: We propose a hardware learning rule for unsupervised clustering within a novel spintronic computing architecture. The proposed approach leverages the three-terminal structure of domain-wall magnetic tunnel junction devices to establish a feedback loop that serves to train such devices when they are used as synapses in a neuromorphic computing architecture.

    Submitted 24 March, 2020; originally announced March 2020.

  15. arXiv:2003.10396  [pdf, other

    cs.NE cs.LG stat.ML

    Evaluating complexity and resilience trade-offs in emerging memory inference machines

    Authors: Christopher H. Bennett, Ryan Dellana, T. Patrick Xiao, Ben Feinberg, Sapan Agarwal, Suma Cardwell, Matthew J. Marinella, William Severa, Brad Aimone

    Abstract: Neuromorphic-style inference only works well if limited hardware resources are maximized properly, e.g. accuracy continues to scale with parameters and complexity in the face of potential disturbance. In this work, we use realistic crossbar simulations to highlight that compact implementations of deep neural networks are unexpectedly susceptible to collapse from multiple system disturbances. Our w… ▽ More

    Submitted 25 February, 2020; originally announced March 2020.

  16. arXiv:2003.07903  [pdf, other

    cs.CC cs.DS

    Hardness of Bounded Distance Decoding on Lattices in $\ell_p$ Norms

    Authors: Huck Bennett, Chris Peikert

    Abstract: $ \newcommand{\Z}{\mathbb{Z}} \newcommand{\eps}{\varepsilon} \newcommand{\cc}[1]{\mathsf{#1}} \newcommand{\NP}{\cc{NP}} \newcommand{\problem}[1]{\mathrm{#1}} \newcommand{\BDD}{\problem{BDD}} $Bounded Distance Decoding $\BDD_{p,α}$ is the problem of decoding a lattice when the target point is promised to be within an $α$ factor of the minimum distance of the lattice, in the $\ell_{p}… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

  17. arXiv:2003.02357  [pdf, other

    cs.NE cs.LG

    Plasticity-Enhanced Domain-Wall MTJ Neural Networks for Energy-Efficient Online Learning

    Authors: Christopher H. Bennett, T. Patrick Xiao, Can Cui, Naimul Hassan, Otitoaleke G. Akinola, Jean Anne C. Incorvia, Alvaro Velasquez, Joseph S. Friedman, Matthew J. Marinella

    Abstract: Machine learning implements backpropagation via abundant training samples. We demonstrate a multi-stage learning system realized by a promising non-volatile memory device, the domain-wall magnetic tunnel junction (DW-MTJ). The system consists of unsupervised (clustering) as well as supervised sub-systems, and generalizes quickly (with few samples). We demonstrate interactions between physical prop… ▽ More

    Submitted 4 March, 2020; originally announced March 2020.

  18. arXiv:2002.00862  [pdf

    cs.NE cond-mat.mes-hall cs.ET physics.app-ph

    CMOS-Free Multilayer Perceptron Enabled by Four-Terminal MTJ Device

    Authors: Wesley H. Brigner, Naimul Hassan, Xuan Hu, Christopher H. Bennett, Felipe Garcia-Sanchez, Matthew J. Marinella, Jean Anne C. Incorvia, Joseph S. Friedman

    Abstract: Neuromorphic computing promises revolutionary improvements over conventional systems for applications that process unstructured information. To fully realize this potential, neuromorphic systems should exploit the biomimetic behavior of emerging nanodevices. In particular, exceptional opportunities are provided by the non-volatility and analog capabilities of spintronic devices. While spintronic d… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  19. arXiv:1911.02440  [pdf, other

    cs.CC cs.DS

    Fine-grained hardness of CVP(P) -- Everything that we can prove (and nothing else)

    Authors: Divesh Aggarwal, Huck Bennett, Alexander Golovnev, Noah Stephens-Davidowitz

    Abstract: We show a number of fine-grained hardness results for the Closest Vector Problem in the $\ell_p$ norm ($\mathrm{CVP}_p$), and its approximate and non-uniform variants. First, we show that $\mathrm{CVP}_p$ cannot be solved in $2^{(1-\varepsilon)n}$ time for all $p \notin 2\mathbb{Z}$ and $\varepsilon > 0$, assuming the Strong Exponential Time Hypothesis (SETH). Second, we extend this by showing tha… ▽ More

    Submitted 7 August, 2021; v1 submitted 6 November, 2019; originally announced November 2019.

  20. arXiv:1905.05485  [pdf

    physics.app-ph cond-mat.mes-hall cs.ET

    Shape-based Magnetic Domain Wall Drift for an Artificial Spintronic Leaky Integrate-and-Fire Neuron

    Authors: Wesley H. Brigner, Naimul Hassan, Lucian Jiang-Wei, Xuan Hu, Diptish Saha, Christopher H. Bennett, Matthew J. Marinella, Jean Anne C. Incorvia, Felipe Garcia-Sanchez, Joseph S. Friedman

    Abstract: Spintronic devices based on domain wall (DW) motion through ferromagnetic nanowire tracks have received great interest as components of neuromorphic information processing systems. Previous proposals for spintronic artificial neurons required external stimuli to perform the leaking functionality, one of the three fundamental functions of a leaky integrate-and-fire (LIF) neuron. The use of this ext… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  21. arXiv:1709.03849  [pdf, other

    cs.NE

    Spatio-temporal Learning with Arrays of Analog Nanosynapses

    Authors: Christopher H. Bennett, Damien Querlioz, Jacques-Olivier Klein

    Abstract: Emerging nanodevices such as resistive memories are being considered for hardware realizations of a variety of artificial neural networks (ANNs), including highly promising online variants of the learning approaches known as reservoir computing (RC) and the extreme learning machine (ELM). We propose an RC/ELM inspired learning system built with nanosynapses that performs both on-chip projection an… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

    Comments: 6 pages, 3 figures. Presented at 2017 IEEE/ACM Symposium on Nanoscale architectures (NANOARCH)

  22. arXiv:1704.03928  [pdf, other

    cs.CC cs.DS

    On the Quantitative Hardness of CVP

    Authors: Huck Bennett, Alexander Golovnev, Noah Stephens-Davidowitz

    Abstract: $ \newcommand{\eps}{\varepsilon} \newcommand{\problem}[1]{\ensuremath{\mathrm{#1}} } \newcommand{\CVP}{\problem{CVP}} \newcommand{\SVP}{\problem{SVP}} \newcommand{\CVPP}{\problem{CVPP}} \newcommand{\ensuremath}[1]{#1} $For odd integers $p \geq 1$ (and $p = \infty$), we show that the Closest Vector Problem in the $\ell_p$ norm ($\CVP_p$) over rank $n$ lattices cannot be solved in $2^{(1-\eps) n}… ▽ More

    Submitted 5 October, 2017; v1 submitted 12 April, 2017; originally announced April 2017.

    Journal ref: FOCS 2017

  23. arXiv:1606.08366  [pdf, other

    cs.NE nlin.AO

    Exploiting the Short-term to Long-term Plasticity Transition in Memristive Nanodevice Learning Architectures

    Authors: Christopher H. Bennett, Selina La Barbera, Adrien F. Vincent, Fabien Alibart, Damien Querlioz

    Abstract: Memristive nanodevices offer new frontiers for computing systems that unite arithmetic and memory operations on-chip. Here, we explore the integration of electrochemical metallization cell (ECM) nanodevices with tunable filamentary switching in nanoscale learning systems. Such devices offer a natural transition between short-term plasticity (STP) and long-term plasticity (LTP). In this work, we sh… ▽ More

    Submitted 27 June, 2016; originally announced June 2016.

    Comments: 9 pages, 8 figures. To be presented July 2016 at the International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada

  24. arXiv:1605.03613  [pdf, ps, other

    cs.DS cs.CC

    On the Lattice Distortion Problem

    Authors: Huck Bennett, Daniel Dadush, Noah Stephens-Davidowitz

    Abstract: We introduce and study the \emph{Lattice Distortion Problem} (LDP). LDP asks how "similar" two lattices are. I.e., what is the minimal distortion of a linear bijection between the two lattices? LDP generalizes the Lattice Isomorphism Problem (the lattice analogue of Graph Isomorphism), which simply asks whether the minimal distortion is one. As our first contribution, we show that the distortion… ▽ More

    Submitted 30 October, 2016; v1 submitted 11 May, 2016; originally announced May 2016.

    Comments: This is the full version of a paper that appeared in ESA 2016

  25. arXiv:1303.7435  [pdf, other

    quant-ph cs.CR cs.IT

    On the security of key distribution based on Johnson-Nyquist noise

    Authors: Charles H. Bennett, C. Jess Riedel

    Abstract: We point out that arguments for the security of Kish's noise-based cryptographic protocol have relied on an unphysical no-wave limit, which if taken seriously would prevent any correlation from developing between the users. We introduce a noiseless version of the protocol, also having illusory security in the no-wave limit, to show that noise and thermodynamics play no essential role. Then we prov… ▽ More

    Submitted 29 March, 2013; originally announced March 2013.

    Comments: 4 pages, 3 figures

  26. arXiv:1006.3520  [pdf, ps, other

    cs.IT math.PR physics.data-an

    Information Distance

    Authors: Charles H. Bennett, Peter Gacs, Ming Li, Paul M. B. Vitanyi, Wojciech H. Zurek

    Abstract: While Kolmogorov complexity is the accepted absolute measure of information content in an individual finite object, a similarly absolute notion is needed for the information distance between two individual objects, for example, two pictures. We give several natural definitions of a universal information metric, based on length of shortest programs for either ordinary computations or reversible (di… ▽ More

    Submitted 17 June, 2010; originally announced June 2010.

    Comments: 39 pages, LaTeX, 2 Figures/Tables

    MSC Class: 68Q30; 94A15; 94A17

    Journal ref: C.H. Bennett, P. Gács, M. Li, P.M.B. Vitányi, and W. Zurek, Information Distance, IEEE Trans. Information Theory, 44:4(1998) 1407--1423

  27. Quantum Reverse Shannon Theorem

    Authors: Charles H. Bennett, Igor Devetak, Aram W. Harrow, Peter W. Shor, Andreas Winter

    Abstract: Dual to the usual noisy channel coding problem, where a noisy (classical or quantum) channel is used to simulate a noiseless one, reverse Shannon theorems concern the use of noiseless channels to simulate noisy ones, and more generally the use of one noisy channel to simulate another. For channels of nonzero capacity, this simulation is always possible, but for it to be efficient, auxiliary resour… ▽ More

    Submitted 4 March, 2014; v1 submitted 30 December, 2009; originally announced December 2009.

    Comments: 35 pages, to appear in IEEE-IT. v2 has a fixed proof of the Clueless Eve result, a new single-letter formula for the "spread deficit", better error scaling, and an improved strong converse. v3 and v4 each make small improvements to the presentation and add references. v5 fixes broken references

    Journal ref: IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2926-2959, May 2014

  28. arXiv:cs/0308026  [pdf

    cs.CR cs.CY

    Improvements to time bracketed authentication

    Authors: Charles H. Bennett

    Abstract: We describe a collection of techniques whereby audiovisual or other recordings of significant events can be made in a way that hinders falsification, pre-dating, or post-dating by interested parties, even by the makers and operators of the recording equipment. A central feature of these techniques is the interplay between private information, which by its nature is untrustworthy and susceptible… ▽ More

    Submitted 18 August, 2003; originally announced August 2003.

    ACM Class: K.6.5; H.5.1; H.5.2

  29. arXiv:cs/0201003  [pdf, ps, other

    cs.CR

    Trust enhancement by multiple random beacons

    Authors: Charles H. Bennett, John A. Smolin

    Abstract: Random beacons-information sources that broadcast a stream of random digits unknown by anyone beforehand-are useful for various cryptographic purposes. But such beacons can be easily and undetectably sabotaged, so that their output is known beforehand by a dishonest party, who can use this information to defeat the cryptographic protocols supposedly protected by the beacon. We explore a strategy… ▽ More

    Submitted 6 January, 2002; originally announced January 2002.

    ACM Class: G.3; K.6.5