Zum Hauptinhalt springen

Showing 1–50 of 80 results for author: Dumas, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.16393  [pdf, other

    cs.CR cs.SC

    Communication Optimal Unbalanced Private Set Union

    Authors: Jean-Guillaume Dumas, Alexis Galan, Bruno Grenet, Aude Maignan, Daniel S. Roche

    Abstract: We consider the private set union (PSU) problem, where two parties each hold a private set of elements, and they want one of the parties (the receiver) to learn the union of the two sets and nothing else. Our protocols are targeted for the unbalanced case where the receiver's set size is larger than the sender's set size, with the goal of minimizing the costs for the sender both in terms of commun… ▽ More

    Submitted 9 July, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  2. arXiv:2402.05630  [pdf, other

    math.NA cs.SC

    Strassen's algorithm is not optimally accurate

    Authors: Jean-Guillaume Dumas, Clément Pernet, Alexandre Sedoglavic

    Abstract: We propose a non-commutative algorithm for multiplying 2x2 matrices using 7 coefficient products. This algorithm reaches simultaneously a better accuracy in practice compared to previously known such fast algorithms, and a time complexity bound with the best currently known leading term (obtained via alternate basis sparsification). To build this algorithm, we consider matrix and tensor norms boun… ▽ More

    Submitted 28 June, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

  3. arXiv:2402.00838  [pdf, other

    cs.CL

    OLMo: Accelerating the Science of Language Models

    Authors: Dirk Groeneveld, Iz Beltagy, Pete Walsh, Akshita Bhagia, Rodney Kinney, Oyvind Tafjord, Ananya Harsh Jha, Hamish Ivison, Ian Magnusson, Yizhong Wang, Shane Arora, David Atkinson, Russell Authur, Khyathi Raghavi Chandu, Arman Cohan, Jennifer Dumas, Yanai Elazar, Yuling Gu, Jack Hessel, Tushar Khot, William Merrill, Jacob Morrison, Niklas Muennighoff, Aakanksha Naik, Crystal Nam , et al. (18 additional authors not shown)

    Abstract: Language models (LMs) have become ubiquitous in both NLP research and in commercial product offerings. As their commercial importance has surged, the most powerful models have become closed off, gated behind proprietary interfaces, with important details of their training data, architectures, and development undisclosed. Given the importance of these details in scientifically studying these models… ▽ More

    Submitted 7 June, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

  4. arXiv:2402.00159  [pdf, other

    cs.CL

    Dolma: an Open Corpus of Three Trillion Tokens for Language Model Pretraining Research

    Authors: Luca Soldaini, Rodney Kinney, Akshita Bhagia, Dustin Schwenk, David Atkinson, Russell Authur, Ben Bogin, Khyathi Chandu, Jennifer Dumas, Yanai Elazar, Valentin Hofmann, Ananya Harsh Jha, Sachin Kumar, Li Lucy, Xinxi Lyu, Nathan Lambert, Ian Magnusson, Jacob Morrison, Niklas Muennighoff, Aakanksha Naik, Crystal Nam, Matthew E. Peters, Abhilasha Ravichander, Kyle Richardson, Zejiang Shen , et al. (11 additional authors not shown)

    Abstract: Information about pretraining corpora used to train the current best-performing language models is seldom discussed: commercial models rarely detail their data, and even open models are often released without accompanying training data or recipes to reproduce them. As a result, it is challenging to conduct and advance scientific research on language modeling, such as understanding how training dat… ▽ More

    Submitted 6 June, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Comments: Accepted at ACL 2024; Dataset: https://hf.co/datasets/allenai/dolma; Code: https://github.com/allenai/dolma

  5. arXiv:2309.15137  [pdf, other

    cs.LG cs.AI

    Deep Generative Methods for Producing Forecast Trajectories in Power Systems

    Authors: Nathan Weill, Jonathan Dumas

    Abstract: With the expansion of renewables in the electricity mix, power grid variability will increase, hence a need to robustify the system to guarantee its security. Therefore, Transport System Operators (TSOs) must conduct analyses to simulate the future functioning of power systems. Then, these simulations are used as inputs in decision-making processes. In this context, we investigate using deep learn… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: Submited to PSCC 2024

  6. In-place accumulation of fast multiplication formulae

    Authors: Jean-Guillaume Dumas, Bruno Grenet

    Abstract: This paper deals with simultaneously fast and in-place algorithms for formulae where the result has to be linearly accumulated: some of the output variables are also input variables, linked by a linear dependency. Fundamental examples include the in-place accumulated multiplication of polynomials or matrices, C+=AB. The difficulty is to combine in-place computations with fast algorithms: those usu… ▽ More

    Submitted 1 July, 2024; v1 submitted 24 July, 2023; originally announced July 2023.

    Comments: Proceedings of the 49th International Symposium on Symbolic and Algebraic Computation (ISSAC'24), ACM SIGSAM, Jul 2024, Raleigh, NC, United States

  7. arXiv:2307.11718  [pdf, other

    cs.CR

    The forking effect

    Authors: Florentina Şoiman, Mathis Mourey, Jean-Guillaume Dumas, Sonia Jimenez-Garces

    Abstract: This study introduces the concept of the forking effect in the cryptocurrency market,specifically focusing on the impact of forking events on bitcoin, also called parent coin.We use a modified exponential GARCH model to examine the bitcoin's response inreturns and volatility. Our findings reveal that forking events do not significantlyaffect the bitcoin's returns but have a strong positive impact… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  8. In-place fast polynomial modular remainder

    Authors: Jean-Guillaume Dumas, Bruno Grenet

    Abstract: We consider the simultaneously fast and in-place computation of the Euclidean polynomial modular remainder $R(X) $\not\equiv$ A(X) \mod B(X)$ with $A$ and $B$ of respective degrees $n$ and $m $\le$ n$. But fast algorithms for this usually come at the expense of (potentially large) extra temporary space. To remain in-place a further issue is to avoid the storage of the whole quotient $Q(X)$ such t… ▽ More

    Submitted 15 July, 2024; v1 submitted 27 February, 2023; originally announced February 2023.

    Comments: Proceedings of the 49th International Symposium on Symbolic and Algebraic Computation (ISSAC'24), ACM SIGSAM, Jul 2024, Raleigh, NC, United States

  9. Denoising diffusion probabilistic models for probabilistic energy forecasting

    Authors: Esteban Hernandez Capel, Jonathan Dumas

    Abstract: Scenario-based probabilistic forecasts have become vital for decision-makers in handling intermittent renewable energies. This paper presents a recent promising deep learning generative approach called denoising diffusion probabilistic models. It is a class of latent variable models which have recently demonstrated impressive results in the computer vision community. However, to our knowledge, the… ▽ More

    Submitted 6 April, 2023; v1 submitted 6 December, 2022; originally announced December 2022.

    Comments: Version accepted to Powertech 2023. arXiv admin note: text overlap with arXiv:2106.09370, arXiv:2107.01034

  10. arXiv:2203.00491  [pdf

    cs.OH

    Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route

    Authors: Joe Dumas

    Abstract: Many runners use watches incorporating Global Positioning System technology to track their workouts. These devices can be valuable training aids, but they have limitations. For several reasons including variations in satellite position, environmental factors, and design decisions made by the manufacturer, GPS-enabled watches can produce position measurement errors. These can result in incorrect es… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

    Journal ref: International Journal of Computer Science and Information Technology, Volume 14, Number 1, February 2022

  11. arXiv:2110.02022  [pdf, other

    cs.CR cs.SC

    VESPo: Verified Evaluation of Secret Polynomials

    Authors: Jean-Guillaume Dumas, Aude Maignan, Clément Pernet, Daniel S. Roche

    Abstract: Proofs of Retrievability are protocols which allow a Client to store data remotely and to efficiently ensure, via audits, that the entirety of that data is still intact. Dynamic Proofs of Retrievability (DPoR) also support efficient retrieval and update of any small portion of the data.We propose a novel protocol for arbitrary outsourced data storage that achieves both low remote storage size and… ▽ More

    Submitted 13 March, 2023; v1 submitted 5 October, 2021; originally announced October 2021.

    Journal ref: Privacy Enhancing Technologies Symposium, Jul 2023, Lausanne (CH), Switzerland

  12. arXiv:2107.01034  [pdf, other

    eess.SY cs.LG

    Microgrid management with weather-based forecasting of energy generation, consumption and prices

    Authors: Jonathan Dumas

    Abstract: The Intergovernmental Panel on Climate Change proposes different mitigation strategies to achieve the net emissions reductions that would be required to follow a pathway that limits global warming to 1.5°C with no or limited overshoot. The transition towards a carbon-free society goes through an inevitable increase in the share of renewable generation in the energy mix and a drastic decrease in th… ▽ More

    Submitted 9 December, 2021; v1 submitted 1 July, 2021; originally announced July 2021.

    Comments: Ph.D. thesis manuscript

  13. arXiv:2106.09370  [pdf, other

    cs.LG eess.SY stat.ML

    A deep generative model for probabilistic energy forecasting in power systems: normalizing flows

    Authors: Jonathan Dumas, Antoine Wehenkel Damien Lanaspeze, Bertrand Cornélusse, Antonio Sutera

    Abstract: Greater direct electrification of end-use sectors with a higher share of renewables is one of the pillars to power a carbon-neutral society by 2050. However, in contrast to conventional power plants, renewable energy is subject to uncertainty raising challenges for their interaction with power systems. Scenario-based probabilistic forecasting models have become a vital tool to equip decision-maker… ▽ More

    Submitted 21 September, 2021; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: Version accepted to be published on Applied Energy

  14. arXiv:2106.07361  [pdf, other

    q-fin.ST cs.LG eess.SP

    Probabilistic Forecasting of Imbalance Prices in the Belgian Context

    Authors: Jonathan Dumas, Ioannis Boukas, Miguel Manuel de Villena, Sébastien Mathieu, Bertrand Cornélusse

    Abstract: Forecasting imbalance prices is essential for strategic participation in the short-term energy markets. A novel two-step probabilistic approach is proposed, with a particular focus on the Belgian case. The first step consists of computing the net regulation volume state transition probabilities. It is modeled as a matrix computed using historical data. This matrix is then used to infer the imbalan… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Journal ref: 2019 16th International Conference on the European Energy Market (EEM). IEEE, 2019

  15. Deep learning-based multi-output quantile forecasting of PV generation

    Authors: Jonathan Dumas, Colin Cointe, Xavier Fettweis, Bertrand Cornélusse

    Abstract: This paper develops probabilistic PV forecasters by taking advantage of recent breakthroughs in deep learning. It tailored forecasting tool, named encoder-decoder, is implemented to compute intraday multi-output PV quantiles forecasts to efficiently capture the time correlation. The models are trained using quantile regression, a non-parametric approach that assumes no prior knowledge of the proba… ▽ More

    Submitted 7 June, 2021; v1 submitted 2 June, 2021; originally announced June 2021.

    Journal ref: 2021 IEEE Madrid PowerTech

  16. arXiv:2105.13801  [pdf, other

    stat.AP cs.AI eess.SY

    A Probabilistic Forecast-Driven Strategy for a Risk-Aware Participation in the Capacity Firming Market: extended version

    Authors: Jonathan Dumas, Colin Cointe, Antoine Wehenkel, Antonio Sutera, Xavier Fettweis, Bertrand Cornélusse

    Abstract: This paper addresses the energy management of a grid-connected renewable generation plant coupled with a battery energy storage device in the capacity firming market, designed to promote renewable power generation facilities in small non-interconnected grids. The core contribution is to propose a probabilistic forecast-driven strategy, modeled as a min-max-min robust optimization problem with reco… ▽ More

    Submitted 19 October, 2021; v1 submitted 28 May, 2021; originally announced May 2021.

    Comments: Extended version of the paper accepted for publication in IEEE Transactions on Sustainable Energy

  17. arXiv:2101.01025  [pdf, other

    cs.SC

    Some fast algorithms multiplying a matrix by its adjoint

    Authors: Jean-Guillaume Dumas, Clément Pernet, Alexandre Sedoglavic

    Abstract: We present a non-commutative algorithm for the multiplication of a 2 x 2 block-matrix by its adjoint, defined by a matrix ring anti-homomorphism. This algorithm uses 5 block products (3 recursive calls and 2 general products)over C or in positive characteristic. The resulting algorithm for arbitrary dimensions is a reduction of multiplication of a matrix by its adjoint to general matrix product, i… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  18. arXiv:2007.12556  [pdf, other

    cs.CR

    Dynamic proofs of retrievability with low server storage

    Authors: Gaspard Anthoine, Jean-Guillaume Dumas, Michael Hanling, Mélanie de Jonghe, Aude Maignan, Clément Pernet, Daniel Roche

    Abstract: Proofs of Retrievability (PoRs) are protocols which allow a client to store data remotely and to efficiently ensure, via audits, that the entirety of that data is still intact. A dynamic PoR system also supports efficient retrieval and update of any small portion of the data. We propose new, simple protocols for dynamic PoR that are designed for practical efficiency, trading decreased persistent… ▽ More

    Submitted 8 June, 2021; v1 submitted 24 July, 2020; originally announced July 2020.

  19. arXiv:2005.09244  [pdf, ps, other

    cs.CR

    A Faster Cryptographer's Conspiracy Santa

    Authors: Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade

    Abstract: In Conspiracy Santa, a variant of Secret Santa, a group of people offer each other Christmas gifts, where each member of the group receives a gift from the other members of the group. To that end, the members of the group form conspiracies, to decide on appropriate gifts, and usually divide the cost of each gift among all participants of that conspiracy. This requires to settle the shared expenses… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Journal ref: Theoretical Computer Science, Elsevier, In press

  20. arXiv:2004.11552  [pdf, other

    cs.CR math.CO

    Optimal Threshold Padlock Systems

    Authors: Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Léo Robert

    Abstract: In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient $k$-out-of-$n$ secret sharing scheme based on Lagrange's interpolation. Liu and S… ▽ More

    Submitted 30 March, 2021; v1 submitted 24 April, 2020; originally announced April 2020.

  21. On fast multiplication of a matrix by its transpose

    Authors: Jean-Guillaume Dumas, Clement Pernet, Alexandre Sedoglavic

    Abstract: We present a non-commutative algorithm for the multiplication of a 2x2-block-matrix by its transpose using 5 block products (3 recursive calls and 2 general products) over C or any finite field.We use geometric considerations on the space of bilinear forms describing 2x2 matrix products to obtain this algorithm and we show how to reduce the number of involved additions.The resulting algorithm for… ▽ More

    Submitted 19 June, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

    Comments: ISSAC 2020, Jul 2020, Kalamata, Greece

  22. Elimination-based certificates for triangular equivalence and rank profiles

    Authors: Jean-Guillaume Dumas, Erich Kaltofen, David Lucas, Clément Pernet

    Abstract: In this paper, we give novel certificates for triangular equivalence and rank profiles. These certificates enable somebody to verify the row or column rank profiles or the whole rank profile matrix faster than recomputing them, with a negligible overall overhead. We first provide quadratic time and space non-interactive certificates saving the logarithmic factors of previously known ones. Then we… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    Comments: Journal of Symbolic Computation, Elsevier, In press. arXiv admin note: substantial text overlap with arXiv:1702.03755

  23. arXiv:1901.10730  [pdf, other

    cs.SC cs.IT

    LU factorization with errors *

    Authors: Jean-Guillaume Dumas, Joris Van Der Hoeven, Clément Pernet, Daniel Roche

    Abstract: We present new algorithms to detect and correct errors in the lower-upper factorization of a matrix, or the triangular linear system solution, over an arbitrary field. Our main algorithms do not require any additional information or encoding other than the original inputs and the erroneous output. Their running time is softly linear in the dimension times the number of errors when there are few er… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  24. arXiv:1901.05052  [pdf, other

    cs.IR cs.LG stat.ML

    Classification of load forecasting studies by forecasting problem to select load forecasting techniques and methodologies

    Authors: Jonathan Dumas, Bertrand Cornélusse

    Abstract: The key contribution of this paper is to propose a classification into two dimensions of the load forecasting studies to decide which forecasting tools to use in which case. This classification aims to provide a synthetic view of the relevant forecasting techniques and methodologies by forecasting problem. In addition, the key principles of the main techniques and methodologies used are summarized… ▽ More

    Submitted 18 March, 2020; v1 submitted 21 December, 2018; originally announced January 2019.

  25. arXiv:1811.02626  [pdf, other

    cs.GR

    Printable Aggregate Elements

    Authors: Jérémie Dumas, Jonàs Martínez, Sylvain Lefebvre, Li-Yi Wei

    Abstract: Aggregating base elements into rigid objects such as furniture or sculptures is a great way for designers to convey a specific look and feel. Unfortunately, there is no existing solution to help model structurally sound aggregates. The challenges stem from the fact that the final shape and its structural properties emerge from the arrangements of the elements, whose sizes are large so that they re… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: 12 pages

    MSC Class: 65D18

  26. arXiv:1806.11293  [pdf, other

    cs.SC cs.CR

    Proof-of-work certificates that can be efficiently computed in the cloud

    Authors: Jean-Guillaume Dumas

    Abstract: In an emerging computing paradigm, computational capabilities, from processing power to storage capacities, are offered to users over communication networks as a cloud-based service. There, demanding computations are outsourced in order to limit infrastructure costs. The idea of verifiable computing is to associate a data structure, a proof-of-work certificate, to the result of the outsourced comp… ▽ More

    Submitted 21 July, 2018; v1 submitted 29 June, 2018; originally announced June 2018.

    Comments: The 20th International Workshop on Computer Algebra in Scientific Computing, Sep 2018, Lille, France

  27. arXiv:1804.08968  [pdf, other

    cs.GR

    Half-Space Power Diagrams and Discrete Surface Offsets

    Authors: Zhen Chen, Daniele Panozzo, Jeremie Dumas

    Abstract: We present an efficient, trivially parallelizable algorithm to compute offset surfaces of shapes discretized using a dexel data structure. Our algorithm is based on a two-stage sweeping procedure that is simple to implement and efficient, entirely avoiding volumetric distance field computations typical of existing methods. Our construction is based on properties of half-space power diagrams, where… ▽ More

    Submitted 8 April, 2019; v1 submitted 24 April, 2018; originally announced April 2018.

    Comments: 15 pages, 20 figures, submitted to IEEE Transactions on Visualization and Computer Graphics

  28. arXiv:1804.03245  [pdf, other

    math.NA cs.GR

    Poly-Spline Finite Element Method

    Authors: Teseo Schneider, Jeremie Dumas, Xifeng Gao, Mario Botsch, Daniele Panozzo, Denis Zorin

    Abstract: We introduce an integrated meshing and finite element method pipeline enabling black-box solution of partial differential equations in the volume enclosed by a boundary representation. We construct a hybrid hexahedral-dominant mesh, which contains a small number of star-shaped polyhedra, and build a set of high-order basis on its elements, combining triquadratic B-splines, triquadratic hexahedra (… ▽ More

    Submitted 8 March, 2019; v1 submitted 9 April, 2018; originally announced April 2018.

    Comments: FORTHCOMING in TOG

    Journal ref: ACM Trans. Graph. 38, 3, Article 19 (June 2019), 16 pages

  29. arXiv:1704.02768  [pdf, other

    cs.CR cs.SC

    Prover efficient public verification of dense or sparse/structured matrix-vector multiplication

    Authors: Jean-Guillaume Dumas, Vincent Zucca

    Abstract: With the emergence of cloud computing services, computationally weak devices (Clients) can delegate expensive tasks to more powerful entities (Servers). This raises the question of verifying a result at a lower cost than that of recomputing it. This verification can be private, between the Client and the Server, or public, when the result can be verified by any third party. We here present protoco… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Journal ref: ACISP 2017, 22nd Australasian Conference on Information Security and Privacy, Jul 2017, Auckland, New Zealand. Lecture Notes in Computer Science, 2017

  30. arXiv:1702.03755  [pdf, ps, other

    cs.SC

    Certificates for triangular equivalence and rank profiles

    Authors: Jean-Guillaume Dumas, David Lucas, Clément Pernet

    Abstract: In this paper, we give novel certificates for triangular equivalence and rank profiles. These certificates enable to verify the row or column rank profiles or the whole rank profile matrix faster than recomputing them, with a negligible overall overhead. We first provide quadratic time and space non-interactive certificates saving the logarithmic factors of previously known ones. Then we propose i… ▽ More

    Submitted 25 October, 2019; v1 submitted 13 February, 2017; originally announced February 2017.

    Journal ref: ACM International Symposium on Symbolic and Algebraic Computations - ISSAC'17, Jul 2017, Kaiserslautern, Germany. pp.133-140, \&\#x27E8;10.1145/3087604.3087609\&\#x27E9

  31. arXiv:1612.05766  [pdf, other

    cs.SC

    Fast Matrix Multiplication and Symbolic Computation

    Authors: Jean-Guillaume Dumas, Victor Pan

    Abstract: The complexity of matrix multiplication (hereafter MM) has been intensively studied since 1969, when Strassen surprisingly decreased the exponent 3 in the cubic cost of the straightforward classical MM to log 2 (7) $\approx$ 2.8074. Applications to some fundamental problems of Linear Algebra and Computer Science have been immediately recognized, but the researchers in Computer Algebra keep discove… ▽ More

    Submitted 17 December, 2016; originally announced December 2016.

  32. arXiv:1607.03629  [pdf, other

    cs.CR cs.SC

    Private Multi-party Matrix Multiplication and Trust Computations

    Authors: Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys

    Abstract: This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a… ▽ More

    Submitted 13 July, 2016; originally announced July 2016.

    Comments: Pierangela Samarati. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Lisbonne, Portugal, 26--28 Juillet 2016. 2016

  33. arXiv:1606.01045  [pdf, ps, other

    cs.CR

    Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen

    Authors: Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade

    Abstract: Akari, Takuzu, Kakuro and KenKen are logic games similar to Sudoku. In Akari, a labyrinth on a grid has to be lit by placing lanterns, respecting various constraints. In Takuzu a grid has to be filled with 0's and 1's, while respecting certain constraints. In Kakuro a grid has to be filled with numbers such that the sums per row and column match given values; similarly in KenKen a grid has to be f… ▽ More

    Submitted 3 June, 2016; originally announced June 2016.

    Comments: FUN with algorithms 2016, Jun 2016, La Maddalena, Italy

  34. arXiv:1602.00810  [pdf, ps, other

    cs.SC

    Linear Time Interactive Certificates for the Minimal Polynomial and the Determinant of a Sparse Matrix

    Authors: Jean-Guillaume Dumas, Erich Kaltofen, Emmanuel Thomé, Gilles Villard

    Abstract: Computational problem certificates are additional data structures for each output, which can be used by a-possibly randomized-verification algorithm that proves the correctness of each output. In this paper, we give an algorithm that computes a certificate for the minimal polynomial of sparse or structured nxn matrices over an abstract field, of sufficiently large cardinality, whose Monte Carlo ve… ▽ More

    Submitted 2 December, 2019; v1 submitted 2 February, 2016; originally announced February 2016.

    Journal ref: International Symposium on Symbolic and Algebraic Computation, Jul 2016, Waterloo, Canada. pp.199-206, \&\#x27E8;10.1145/2930889.2930908\&\#x27E9

  35. Fast Computation of the Rank Profile Matrix and the Generalized Bruhat Decomposition

    Authors: Jean-Guillaume Dumas, Clement Pernet, Ziad Sultan

    Abstract: The row (resp. column) rank profile of a matrix describes the stair-case shape of its row (resp. column) echelon form. We here propose a new matrix invariant, the rank profile matrix, summarizing all information on the row and column rank profiles of all the leading sub-matrices. We show that this normal form exists and is unique over any ring, provided that the notion of McCoy's rank is used, in… ▽ More

    Submitted 14 May, 2018; v1 submitted 8 January, 2016; originally announced January 2016.

    Comments: arXiv admin note: substantial text overlap with arXiv:1501.05239

    Journal ref: Journal of Symbolic Computation, Elsevier, 2017, Special issue on ISSAC'15, 83, pp.187-210

  36. arXiv:1507.01083  [pdf, ps, other

    cs.SC cs.CC cs.CR

    Interactive certificate for the verification of Wiedemann's Krylov sequence: application to the certification of the determinant, the minimal and the characteristic polynomials of sparse matrices

    Authors: Jean-Guillaume Dumas, Erich Kaltofen, Emmanuel Thomé

    Abstract: Certificates to a linear algebra computation are additional data structures for each output, which can be used by a-possibly randomized- verification algorithm that proves the correctness of each output. Wiede-mann's algorithm projects the Krylov sequence obtained by repeatedly multiplying a vector by a matrix to obtain a linearly recurrent sequence. The minimal polynomial of this sequence divides… ▽ More

    Submitted 4 July, 2015; originally announced July 2015.

  37. arXiv:1503.00948  [pdf, ps, other

    cs.LO

    Hilbert-Post completeness for the state and the exception effects

    Authors: Jean-Guillaume Dumas, Dominique Duval, Burak Ekici, Damien Pous, Jean-Claude Reynaud

    Abstract: In this paper, we present a novel framework for studying the syntactic completeness of computational effects and we apply it to the exception effect. When applied to the states effect, our framework can be seen as a generalization of Pretnar's work on this subject. We first introduce a relative notion of Hilbert-Post completeness, well-suited to the composition of effects. Then we prove that the e… ▽ More

    Submitted 8 October, 2015; v1 submitted 3 March, 2015; originally announced March 2015.

    Comments: Siegfried Rump (Hamburg University of Technology), Chee Yap (Courant Institute, NYU). Sixth International Conference on Mathematical Aspects of Computer and Information Sciences , Nov 2015, Berlin, Germany. 2015, LNCS

  38. Computing the Rank Profile Matrix

    Authors: Jean-Guillaume Dumas, Clément Pernet, Ziad Sultan

    Abstract: The row (resp. column) rank profile of a matrix describes the staircase shape of its row (resp. column) echelon form. In an ISSAC'13 paper, we proposed a recursive Gaussian elimination that can compute simultaneously the row and column rank profiles of a matrix as well as those of all of its leading sub-matrices, in the same time as state of the art Gaussian elimination algorithms. Here we first s… ▽ More

    Submitted 20 August, 2015; v1 submitted 21 January, 2015; originally announced January 2015.

    Journal ref: ACM International Symposium on Symbolic and Algebraic Computations, pp.146--153, 2015, ISSAC 2015

  39. arXiv:1411.7140  [pdf, ps, other

    cs.LO

    Program certification with computational effects

    Authors: Jean-Guillaume Dumas, Dominique Duval, Burak Ekici, Damien Pous

    Abstract: Dynamic evaluation is a paradigm in computer algebra which was introduced for computing with algebraic numbers. In linear algebra, for instance, dynamic evaluation can be used to apply programs which have been written for matrices with coefficients modulo some prime number to matrices with coefficients modulo some composite number. A way to implement dynamic evaluation in modern computing language… ▽ More

    Submitted 26 November, 2014; originally announced November 2014.

  40. arXiv:1411.2503  [pdf, ps, other

    cs.CR

    Generating S-Boxes from Semi-fields Pseudo-extensions

    Authors: Jean-Guillaume Dumas, Jean-Baptiste Orfila

    Abstract: Specific vectorial boolean functions, such as S-Boxes or APN functions have many applications, for instance in symmetric ciphers. In cryptography they must satisfy some criteria (balancedness, high nonlinearity, high algebraic degree, avalanche, or transparency) to provide best possible resistance against attacks. Functions satisfying most criteria are however difficult to find. Indeed, random gen… ▽ More

    Submitted 10 November, 2014; originally announced November 2014.

  41. arXiv:1407.3262  [pdf, ps, other

    cs.MS cs.SC cs.SE

    Elements of Design for Containers and Solutions in the LinBox Library

    Authors: Brice Boyer, Jean-Guillaume Dumas, Pascal Giorgi, Clément Pernet, B. David Saunders

    Abstract: We describe in this paper new design techniques used in the \cpp exact linear algebra library \linbox, intended to make the library safer and easier to use, while keeping it generic and efficient. First, we review the new simplified structure for containers, based on our \emph{founding scope allocation} model. We explain design choices and their impact on coding: unification of our matrix classes,… ▽ More

    Submitted 25 June, 2014; originally announced July 2014.

    Comments: 8 pages, 4th International Congress on Mathematical Software, Seoul : Korea, Republic Of (2014)

  42. arXiv:1402.3501  [pdf, other

    cs.SC cs.DC

    Parallel computation of echelon forms

    Authors: Jean-Guillaume Dumas, Thierry Gautier, Clément Pernet, Ziad Sultan

    Abstract: We propose efficient parallel algorithms and implementations on shared memory architectures of LU factorization over a finite field. Compared to the corresponding numerical routines, we have identified three main difficulties specific to linear algebra over finite fields. First, the arithmetic complexity could be dominated by modular reductions. Therefore, it is mandatory to delay as much as possi… ▽ More

    Submitted 14 February, 2014; originally announced February 2014.

  43. Breaking a monad-comonad symmetry between computational effects

    Authors: Jean-Guillaume Dumas, Dominique Duval, Jean-Claude Reynaud

    Abstract: Computational effects may often be interpreted in the Kleisli category of a monad or in the coKleisli category of a comonad. The duality between monads and comonads corresponds, in general, to a symmetry between construction and observation, for instance between raising an exception and looking up a state. Thanks to the properties of adjunction one may go one step further: the coKleisli-on-Kleisli… ▽ More

    Submitted 5 February, 2014; originally announced February 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1310.0605

    Journal ref: Mathematical Structures in Computer Science 22, 4 (2012) p.719-722

  44. Essentially optimal interactive certificates in linear algebra

    Authors: Jean-Guillaume Dumas, Erich Kaltofen

    Abstract: Certificates to a linear algebra computation are additional data structures for each output, which can be used by a---possibly randomized---verification algorithm that proves the correctness of each output. The certificates are essentially optimal if the time (and space) complexity of verification is essentially linear in the input size $N$, meaning $N$ times a factor $N^{o(1)}$, i.e., a factor… ▽ More

    Submitted 8 January, 2020; v1 submitted 18 January, 2014; originally announced January 2014.

    Journal ref: ACM International Symposium on Symbolic and Algebraic Computation (ISSAC 2014), Jul 2014, Kobe, Japan. pp.146-153

  45. arXiv:1310.2338  [pdf, ps, other

    cs.LO

    Certified proofs in programs involving exceptions

    Authors: Jean-Guillaume Dumas, Dominique Duval, Burak Ekici, Jean-Claude Reynaud

    Abstract: Exception handling is provided by most modern programming languages. It allows to deal with anomalous or exceptional events which require special processing. In computer algebra, exception handling is an efficient way to implement the dynamic evaluation paradigm: for instance, in linear algebra, dynamic evaluation can be used for applying programs which have been written for matrices with coeffici… ▽ More

    Submitted 13 March, 2014; v1 submitted 9 October, 2013; originally announced October 2013.

  46. arXiv:1310.0794  [pdf, ps, other

    cs.LO cs.PL

    Formal verification in Coq of program properties involving the global state effect

    Authors: Jean-Guillaume Dumas, Dominique Duval, Burak Ekici, Damien Pous

    Abstract: The syntax of an imperative language does not mention explicitly the state, while its denotational semantics has to mention it. In this paper we present a framework for the verification in Coq of properties of programs manipulating the global state effect. These properties are expressed in a proof system which is close to the syntax, as in effect systems, in the sense that the state does not appea… ▽ More

    Submitted 14 October, 2013; v1 submitted 2 October, 2013; originally announced October 2013.

  47. arXiv:1310.0605  [pdf, ps, other

    cs.LO

    Patterns for computational effects arising from a monad or a comonad

    Authors: Jean-Guillaume Dumas, Dominique Duval, Jean-Claude Reynaud

    Abstract: This paper presents equational-based logics for proving first order properties of programming languages involving effects. We propose two dual inference system patterns that can be instanciated with monads or comonads in order to be used for proving properties of different effects. The first pattern provides inference rules which can be interpreted in the Kleisli category of a monad and the coKlei… ▽ More

    Submitted 14 October, 2013; v1 submitted 2 October, 2013; originally announced October 2013.

  48. arXiv:1301.4438  [pdf, other

    math.NA cs.MS

    Simultaneous computation of the row and column rank profiles

    Authors: Jean-Guillaume Dumas, Clément Pernet, Ziad Sultan

    Abstract: Gaussian elimination with full pivoting generates a PLUQ matrix decomposition. Depending on the strategy used in the search for pivots, the permutation matrices can reveal some information about the row or the column rank profiles of the matrix. We propose a new pivoting strategy that makes it possible to recover at the same time both row and column rank profiles of the input matrix and of any of… ▽ More

    Submitted 18 January, 2013; originally announced January 2013.

    Journal ref: ISSAC 2013, Boston, MA : États-Unis (2013)

  49. arXiv:1210.6780  [pdf, ps, other

    cs.CR cs.GT

    Brandt's Fully Private Auction Protocol Revisited

    Authors: Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade

    Abstract: Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on… ▽ More

    Submitted 14 May, 2013; v1 submitted 25 October, 2012; originally announced October 2012.

    Comments: Africacrypt 2013, Le Caire : Egypt (2013)

  50. On Newton-Raphson iteration for multiplicative inverses modulo prime powers

    Authors: Jean-Guillaume Dumas

    Abstract: We study algorithms for the fast computation of modular inverses. Newton-Raphson iteration over $p$-adic numbers gives a recurrence relation computing modular inverse modulo $p^m$, that is logarithmic in $m$. We solve the recurrence to obtain an explicit formula for the inverse. Then we study different implementation variants of this iteration and show that our explicit formula is interesting for… ▽ More

    Submitted 15 May, 2018; v1 submitted 28 September, 2012; originally announced September 2012.

    Journal ref: IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2014, 63 (8), pp.2106-2109