Zum Hauptinhalt springen

Showing 1–33 of 33 results for author: Ryan, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11695  [pdf, other

    cs.CL cs.AI cs.LG

    Optimizing Instructions and Demonstrations for Multi-Stage Language Model Programs

    Authors: Krista Opsahl-Ong, Michael J Ryan, Josh Purtell, David Broman, Christopher Potts, Matei Zaharia, Omar Khattab

    Abstract: Language Model Programs, i.e. sophisticated pipelines of modular language model (LM) calls, are increasingly advancing NLP tasks, but they require crafting prompts that are jointly effective for all modules. We study prompt optimization for LM programs, i.e. how to update these prompts to maximize a downstream metric without access to module-level labels or gradients. To make this tractable, we fa… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: Krista and Michael contributed equally to this work

  2. arXiv:2405.02599  [pdf

    cs.DL

    Assembling ensembling: An adventure in approaches across disciplines

    Authors: Amanda Bleichrodt, Lydia Bourouiba, Gerardo Chowell, Eric T. Lofgren, J. Michael Reed, Sadie J. Ryan, Nina H. Fefferman

    Abstract: When we think of model ensembling or ensemble modeling, there are many possibilities that come to mind in different disciplines. For example, one might think of a set of descriptions of a phenomenon in the world, perhaps a time series or a snapshot of multivariate space, and perhaps that set is comprised of data-independent descriptions, or perhaps it is quite intentionally fit *to* data, or even… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: 33 pages, 4 figures

  3. arXiv:2402.15018  [pdf, other

    cs.CL cs.CY cs.LG

    Unintended Impacts of LLM Alignment on Global Representation

    Authors: Michael J. Ryan, William Held, Diyi Yang

    Abstract: Before being deployed for user-facing applications, developers align Large Language Models (LLMs) to user preferences through a variety of procedures, such as Reinforcement Learning From Human Feedback (RLHF) and Direct Preference Optimization (DPO). Current evaluations of these procedures focus on benchmarks of instruction following, reasoning, and truthfulness. However, human preferences are not… ▽ More

    Submitted 6 June, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

    Comments: Accepted to ACL 2024 main conference

  4. arXiv:2312.13171  [pdf, other

    cs.ET

    Programmable electrical coupling between stochastic magnetic tunnel junctions

    Authors: Sidra Gibeault, Temitayo N. Adeyeye, Liam A. Pocher, Daniel P. Lathrop, Matthew W. Daniels, Mark D. Stiles, Jabez J. McClelland, William A. Borders, Jason T. Ryan, Philippe Talatchian, Ursula Ebels, Advait Madhavan

    Abstract: Superparamagnetic tunnel junctions (SMTJs) are promising sources of randomness for compact and energy efficient implementations of probabilistic computing techniques. Augmenting an SMTJ with electronic circuits, to convert the random telegraph fluctuations of its resistance state to stochastic digital signals, gives a basic building block known as a probabilistic bit or $p$-bit. Though scalable pr… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  5. arXiv:2305.15678  [pdf, other

    cs.CL cs.AI

    Revisiting non-English Text Simplification: A Unified Multilingual Benchmark

    Authors: Michael J. Ryan, Tarek Naous, Wei Xu

    Abstract: Recent advancements in high-quality, large-scale English resources have pushed the frontier of English Automatic Text Simplification (ATS) research. However, less work has been done on multilingual text simplification due to the lack of a diverse evaluation benchmark that covers complex-simple sentence pairs in many languages. This paper introduces the MultiSim benchmark, a collection of 27 resour… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: Accepted to ACL 2023 main conference

  6. arXiv:2305.14463  [pdf, other

    cs.CL cs.AI cs.LG

    ReadMe++: Benchmarking Multilingual Language Models for Multi-Domain Readability Assessment

    Authors: Tarek Naous, Michael J. Ryan, Anton Lavrouk, Mohit Chandra, Wei Xu

    Abstract: We present a comprehensive evaluation of large language models for multilingual readability assessment. Existing evaluation resources lack domain and language diversity, limiting the ability for cross-domain and cross-lingual analyses. This paper introduces ReadMe++, a multilingual multi-domain dataset with human annotations of 9757 sentences in Arabic, English, French, Hindi, and Russian, collect… ▽ More

    Submitted 8 June, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

  7. arXiv:2305.14456  [pdf, other

    cs.CL cs.AI cs.LG

    Having Beer after Prayer? Measuring Cultural Bias in Large Language Models

    Authors: Tarek Naous, Michael J. Ryan, Alan Ritter, Wei Xu

    Abstract: As the reach of large language models (LMs) expands globally, their ability to cater to diverse cultural contexts becomes crucial. Despite advancements in multilingual capabilities, models are not designed with appropriate cultural nuances. In this paper, we show that multilingual and Arabic monolingual LMs exhibit bias towards entities associated with Western culture. We introduce CAMeL, a novel… ▽ More

    Submitted 20 March, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

  8. arXiv:2303.12390  [pdf, other

    cs.RO

    Demonstrating Performance Benefits of Human-Swarm Teaming

    Authors: William Hunt, Jack Ryan, Ayodeji O. Abioye, Sarvapali D. Ramchurn, Mohammad D. Soorati

    Abstract: Autonomous swarms of robots can bring robustness, scalability and adaptability to safety-critical tasks such as search and rescue but their application is still very limited. Using semi-autonomous swarms with human control can bring robot swarms to real-world applications. Human operators can define goals for the swarm, monitor their performance and interfere with, or overrule, the decisions and b… ▽ More

    Submitted 23 March, 2023; v1 submitted 22 March, 2023; originally announced March 2023.

    Comments: 3 Pages, 2 Figures, Accepted to AAMAS 2023 Demo tack

  9. arXiv:2210.00417  [pdf, other

    eess.AS cs.CY cs.SD

    Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward

    Authors: Awais Khan, Khalid Mahmood Malik, James Ryan, Mikul Saravanan

    Abstract: Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use them for spreading misinformation. Various countermeasures have been proposed to detect these spoofing attacks. Due to the extensive work done on spoofing detection in automated speaker verification (ASV) systems in the last 6-7 years, there is a need to classify the research and perform qualitative… ▽ More

    Submitted 21 November, 2022; v1 submitted 1 October, 2022; originally announced October 2022.

  10. arXiv:2204.01711  [pdf, other

    eess.IV cs.CV

    Single Image Internal Distribution Measurement Using Non-Local Variational Autoencoder

    Authors: Yeahia Sarker, Abdullah-Al-Zubaer Imran, Md Hafiz Ahamed, Ripon K. Chakrabortty, Michael J. Ryan, Sajal K. Das

    Abstract: Deep learning-based super-resolution methods have shown great promise, especially for single image super-resolution (SISR) tasks. Despite the performance gain, these methods are limited due to their reliance on copious data for model training. In addition, supervised SISR solutions rely on local neighbourhood information focusing only on the feature learning processes for the reconstruction of low… ▽ More

    Submitted 2 April, 2022; originally announced April 2022.

    Comments: A Preprint Version

  11. arXiv:2202.03655  [pdf, other

    cs.LG math.NA

    Linear Time Kernel Matrix Approximation via Hyperspherical Harmonics

    Authors: John Paul Ryan, Anil Damle

    Abstract: We propose a new technique for constructing low-rank approximations of matrices that arise in kernel methods for machine learning. Our approach pairs a novel automatically constructed analytic expansion of the underlying kernel function with a data-dependent compression step to further optimize the approximation. This procedure works in linear time and is applicable to any isotropic kernel. Moreov… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  12. arXiv:2108.07258  [pdf, other

    cs.LG cs.AI cs.CY

    On the Opportunities and Risks of Foundation Models

    Authors: Rishi Bommasani, Drew A. Hudson, Ehsan Adeli, Russ Altman, Simran Arora, Sydney von Arx, Michael S. Bernstein, Jeannette Bohg, Antoine Bosselut, Emma Brunskill, Erik Brynjolfsson, Shyamal Buch, Dallas Card, Rodrigo Castellon, Niladri Chatterji, Annie Chen, Kathleen Creel, Jared Quincy Davis, Dora Demszky, Chris Donahue, Moussa Doumbouya, Esin Durmus, Stefano Ermon, John Etchemendy, Kawin Ethayarajh , et al. (89 additional authors not shown)

    Abstract: AI is undergoing a paradigm shift with the rise of models (e.g., BERT, DALL-E, GPT-3) that are trained on broad data at scale and are adaptable to a wide range of downstream tasks. We call these models foundation models to underscore their critically central yet incomplete character. This report provides a thorough account of the opportunities and risks of foundation models, ranging from their cap… ▽ More

    Submitted 12 July, 2022; v1 submitted 16 August, 2021; originally announced August 2021.

    Comments: Authored by the Center for Research on Foundation Models (CRFM) at the Stanford Institute for Human-Centered Artificial Intelligence (HAI). Report page with citation guidelines: https://crfm.stanford.edu/report.html

  13. arXiv:2106.04487  [pdf, other

    cs.LG math.NA

    The Fast Kernel Transform

    Authors: John Paul Ryan, Sebastian Ament, Carla P. Gomes, Anil Damle

    Abstract: Kernel methods are a highly effective and widely used collection of modern machine learning algorithms. A fundamental limitation of virtually all such methods are computations involving the kernel matrix that naively scale quadratically (e.g., constructing the kernel matrix and matrix-vector multiplication) or cubically (solving linear systems) with the size of the data set $N.$ We propose the Fas… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

  14. Monitoring the edges of a graph using distances

    Authors: Florent Foucaud, Shih-Shun Kao, Ralf Klasing, Mirka Miller, Joe Ryan

    Abstract: We introduce a new graph-theoretic concept in the area of network monitoring. A set $M$ of vertices of a graph $G$ is a \emph{distance-edge-monitoring set} if for every edge $e$ of $G$, there is a vertex $x$ of $M$ and a vertex $y$ of $G$ such that $e$ belongs to all shortest paths between $x$ and $y$. We denote by $dem(G)$ the smallest size of such a set in $G$. The vertices of $M$ represent dist… ▽ More

    Submitted 23 September, 2022; v1 submitted 30 October, 2020; originally announced November 2020.

    Comments: 19 pages; 5 figures. A preliminary version appeared in the proceedings of CALDAM 2020

    Journal ref: Discrete Applied Mathematics 319:424-438, 2022

  15. arXiv:1904.02791  [pdf, other

    math.NT cs.DM

    Enumeration of irreducible and extended irreducible Goppa codes

    Authors: Kondwani Magamba, John A. Ryan

    Abstract: We obtain upper bounds on the number of irreducible and extended irreducible Goppa codes over $GF(p)$ of length $q$ and $q+1$, respectively defined by polynomials of degree $r$, where $q=p^t$ and $r\geq 3$ is a positive integer.

    Submitted 26 March, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1803.00619

    MSC Class: 11T71

  16. arXiv:1803.00619  [pdf, other

    math.NT cs.DM

    Counting Extended Irreducible Goppa Codes

    Authors: Kondwani Magamba, John A. Ryan

    Abstract: We obtain an upper bound on the number of extended irreducible q-ary Goppa codes of degree $r$ and length $q^n+1$, where $q=p^t$ and $n$ and $r>2$ are prime numbers.

    Submitted 23 February, 2018; originally announced March 2018.

  17. arXiv:1710.08758  [pdf, other

    cs.DM

    Two dichotomies for model-checking in multi-layer structures

    Authors: Jessica Enright, Kitty Meeks, Jessica Ryan

    Abstract: Multi-layer graphs can capture qualitatively different types of connection between entities, and networks of this kind are prevalent in biological and social systems: for example, a social contact network typically involves both virtual and face-to-face interactions between individuals. Since each layer is likely to exhibit stronger and/or more easily identifiable structurally properties than the… ▽ More

    Submitted 23 July, 2020; v1 submitted 24 October, 2017; originally announced October 2017.

    Comments: One incorrect reference fixed

  18. arXiv:1708.09090  [pdf, other

    cs.CL

    Automating Direct Speech Variations in Stories and Games

    Authors: Stephanie M. Lukin, James O. Ryan, Marilyn A. Walker

    Abstract: Dialogue authoring in large games requires not only content creation but the subtlety of its delivery, which can vary from character to character. Manually authoring this dialogue can be tedious, time-consuming, or even altogether infeasible. This paper utilizes a rich narrative representation for modeling dialogue and an expressive natural language generation engine for realizing it, and expands… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: 3rd Workshop on Games and NLP (GAMNLP 2014)

  19. arXiv:1703.08030  [pdf, other

    cs.IT

    Indoor Office Wideband Penetration Loss Measurements at 73 GHz

    Authors: Jacqueline Ryan, George R. MacCartney Jr., Theodore S. Rappaport

    Abstract: This paper presents millimeter wave (mmWave) penetration loss measurements and analysis at 73 GHz using a wideband sliding correlator channel sounder in an indoor office environment. Penetration loss was measured using a carefully controlled measurement setup for many common indoor building materials such as glass doors, glass windows, closet doors, steel doors, and whiteboard writing walls. Measu… ▽ More

    Submitted 30 May, 2017; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: in 2017 IEEE International Conference on Communications Workshop (ICCW), Paris, France, May 2017

  20. arXiv:1702.08178  [pdf, ps, other

    cs.DM math.CO

    The metric dimension of the circulant graph $C(n,\pm\{1,2,3,4\})$

    Authors: Cyriac Grigorious, Thomas Kalinowski, Joe Ryan, Sudeep Stephen

    Abstract: Let $G=(V,E)$ be a connected graph and let $d(u,v)$ denote the distance between vertices $u,v \in V$. A metric basis for $G$ is a set $B\subseteq V$ of minimum cardinality such that no two vertices of $G$ have the same distances to all points of $B$. The cardinality of a metric basis of $G$ is called the metric dimension of $G$, denoted by $\dim(G)$. In this paper we determine the metric dimension… ▽ More

    Submitted 18 June, 2017; v1 submitted 27 February, 2017; originally announced February 2017.

    Journal ref: Australasian Journal of Combinatorics, 69(3), 417-441, 2017

  21. arXiv:1702.02639  [pdf, ps, other

    math.CO cs.DM

    Cube-magic labelings of grids

    Authors: Rachel Wulan Nirmalasari Wijaya, Joe Ryan, Thomas Kalinowski

    Abstract: We show that the vertices and edges of a $d$-dimensional grid graph $G=(V,E)$ ($d\geqslant 2$) can be labeled with the integers from $\{1,\ldots,\lvert V\rvert\}$ and $\{1,\ldots,\lvert E\rvert\}$, respectively, in such a way that for every subgraph $H$ isomorphic to a $d$-cube the sum of all the labels of $H$ is the same. As a consequence, for every $d\geqslant 2$, every $d$-dimensional grid grap… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

  22. On the power domination number of de Bruijn and Kautz digraphs

    Authors: Cyriac Grigorious, Thomas Kalinowski, Joe Ryan, Sudeep Stephen

    Abstract: Let $G=(V,A)$ be a directed graph without parallel arcs, and let $S\subseteq V$ be a set of vertices. Let the sequence $S=S_0\subseteq S_1\subseteq S_2\subseteq\cdots$ be defined as follows: $S_1$ is obtained from $S_0$ by adding all out-neighbors of vertices in $S_0$. For $k\geqslant 2$, $S_k$ is obtained from $S_{k-1}$ by adding all vertices $w$ such that for some vertex $v\in S_{k-1}$, $w$ is t… ▽ More

    Submitted 6 December, 2016; originally announced December 2016.

    Journal ref: Combinatorial Algorithms. IWOCA 2017. Lecture Notes in Computer Science, vol 10765 (2018), 264-272

  23. arXiv:1609.02809  [pdf

    cs.CL

    Harassment detection: a benchmark on the #HackHarassment dataset

    Authors: Alexei Bastidas, Edward Dixon, Chris Loo, John Ryan

    Abstract: Online harassment has been a problem to a greater or lesser extent since the early days of the internet. Previous work has applied anti-spam techniques like machine-learning based text classification (Reynolds, 2011) to detecting harassing messages. However, existing public datasets are limited in size, with labels of varying quality. The #HackHarassment initiative (an alliance of 1 tech companies… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

    Comments: Accepted to the Collaborative European Research Conference 2016

  24. arXiv:1607.07911  [pdf, ps, other

    cs.DM math.CO

    $H$-supermagic labelings for firecrackers, banana trees and flowers

    Authors: Rachel Wulan Nirmalasari Wijaya, Andrea Semaničová-Feňovčíková, Joe Ryan, Thomas Kalinowski

    Abstract: A simple graph $G=(V,E)$ admits an $H$-covering if every edge in $E$ is contained in a subgraph $H'=(V',E')$ of $G$ which is isomorphic to $H$. In this case we say that $G$ is $H$-supermagic if there is a bijection $f:V\cup E\to\{1,\ldots\lvert V\rvert+\lvert E\rvert\}$ such that $f(V)=\{1,\ldots,\lvert V\rvert\}$ and $\sum_{v\in V(H')}f(v)+\sum_{e\in E(H')}f(e)$ is constant over all subgraphs… ▽ More

    Submitted 27 June, 2017; v1 submitted 26 July, 2016; originally announced July 2016.

    Journal ref: Australasian Journal of Combinatorics, 69(3), 442-451, 2017

  25. Minimum rank and zero forcing number for butterfly networks

    Authors: Daniela Ferrero, Cyriac Grigorious, Thomas Kalinowski, Joe Ryan, Sudeep Stephen

    Abstract: The minimum rank of a simple graph $G$ is the smallest possible rank over all symmetric real matrices $A$ whose nonzero off-diagonal entries correspond to the edges of $G$. Using the zero forcing number, we prove that the minimum rank of the butterfly network is $\frac19\left[(3r+1)2^{r+1}-2(-1)^r\right]$ and that this is equal to the rank of its adjacency matrix.

    Submitted 4 July, 2018; v1 submitted 25 July, 2016; originally announced July 2016.

    MSC Class: 05C96; 05C57; 94C15

    Journal ref: Journal of Combinatorial Optimization 37 (2019), 970-988

  26. arXiv:1607.06852  [pdf, other

    cs.CL

    CFGs-2-NLU: Sequence-to-Sequence Learning for Mapping Utterances to Semantics and Pragmatics

    Authors: Adam James Summerville, James Ryan, Michael Mateas, Noah Wardrip-Fruin

    Abstract: In this paper, we present a novel approach to natural language understanding that utilizes context-free grammars (CFGs) in conjunction with sequence-to-sequence (seq2seq) deep learning. Specifically, we take a CFG authored to generate dialogue for our target application for NLU, a videogame, and train a long short-term memory (LSTM) recurrent neural network (RNN) to map the surface utterances that… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

    Report number: UCSC-SOE-16-11

  27. arXiv:1601.04512  [pdf, other

    physics.ins-det cs.OH nucl-ex

    Pulse processing routines for neutron time-of-flight data

    Authors: P. Žugec, C. Weiß, C. Guerrero, F. Gunsing, V. Vlachoudis, M. Sabate-Gilarte, A. Stamatopoulos, T. Wright, J. Lerendegui-Marco, F. Mingrone, J. A. Ryan, S. G. Warren, A. Tsinganis, M. Barbagallo

    Abstract: A pulse shape analysis framework is described, which was developed for n_TOF-Phase3, the third phase in the operation of the n_TOF facility at CERN. The most notable feature of this new framework is the adoption of generic pulse shape analysis routines, characterized by a minimal number of explicit assumptions about the nature of pulses. The aim of these routines is to be applicable to a wide vari… ▽ More

    Submitted 18 January, 2016; originally announced January 2016.

    Comments: 13 pages, 10 figures, 5 tables

    Journal ref: Nuclear Instruments and Methods in Physics Research A 812 (2016) 134-144

  28. arXiv:1406.3289  [pdf, other

    cs.DM math.CO

    Indeterminate Strings, Prefix Arrays & Undirected Graphs

    Authors: Manolis Christodoulakis, P. J. Ryan, W. F. Smyth, Shu Wang

    Abstract: An integer array y = y[1..n] is said to be feasible if and only if y[1] = n and, for every i \in 2..n, i \le i+y[i] \le n+1. A string is said to be indeterminate if and only if at least one of its elements is a subset of cardinality greater than one of a given alphabet Sigma; otherwise it is said to be regular. A feasible array y is said to be regular if and only if it is the prefix array of some… ▽ More

    Submitted 12 June, 2014; originally announced June 2014.

    Comments: 20 pages

  29. arXiv:1203.4069  [pdf, other

    math.CO cs.DM

    The Maximum Degree-and-Diameter-Bounded Subgraph in the Mesh

    Authors: Mirka Miller, Hebert Perez-Roses, Joe Ryan

    Abstract: The problem of finding the largest connected subgraph of a given undirected host graph, subject to constraints on the maximum degree $Δ$ and the diameter $D$, was introduced in \cite{maxddbs}, as a generalization of the Degree-Diameter Problem. A case of special interest is when the host graph is a common parallel architecture. Here we discuss the case when the host graph is a $k$-dimensional mesh… ▽ More

    Submitted 19 March, 2012; originally announced March 2012.

    Comments: accepted, 18 pages, 7 figures; Discrete Applied Mathematics, 2012

    MSC Class: 05C35 (Primary) 05C12; 05C90; 68R10; 95C15 (Secondary)

  30. Sum Rates, Rate Allocation, and User Scheduling for Multi-User MIMO Vector Perturbation Precoding

    Authors: Adeel Razi, Daniel J. Ryan, Iain B. Collings, Jinhong Yuan

    Abstract: This paper considers the multiuser multiple-input multiple-output (MIMO) broadcast channel. We consider the case where the multiple transmit antennas are used to deliver independent data streams to multiple users via vector perturbation. We derive expressions for the sum rate in terms of the average energy of the precoded vector, and use this to derive a high signal-to-noise ratio (SNR) closed-f… ▽ More

    Submitted 5 November, 2009; originally announced November 2009.

    Comments: 27 pages with 6 figures and 2 tables. Accepted for publication in IEEE Trans. Wireless Commu

  31. GLRT-Optimal Noncoherent Lattice Decoding

    Authors: Daniel J. Ryan, Iain B. Collings, I. Vaughan L. Clarkson

    Abstract: This paper presents new low-complexity lattice-decoding algorithms for noncoherent block detection of QAM and PAM signals over complex-valued fading channels. The algorithms are optimal in terms of the generalized likelihood ratio test (GLRT). The computational complexity is polynomial in the block length; making GLRT-optimal noncoherent detection feasible for implementation. We also provide eve… ▽ More

    Submitted 12 April, 2007; originally announced April 2007.

    Comments: 30 pages, 6 figures Accepted to IEEE Transactions on Signal Processing

  32. arXiv:cs/0308024  [pdf, ps, other

    cs.DC

    Relational Grid Monitoring Architecture (R-GMA)

    Authors: Rob Byrom, Brian Coghlan, Andrew W Cooke, Roney Cordenonsi, Linda Cornwall, Abdeslem Djaoui, Laurence Field, Steve Fisher, Steve Hicks, Stuart Kenny, Jason Leake, James Magowan, Werner Nutt, David O'Callaghan, Norbert Podhorszki, John Ryan, Manish Soni, Paul Taylor, Antony J Wilson

    Abstract: We describe R-GMA (Relational Grid Monitoring Architecture) which has been developed within the European DataGrid Project as a Grid Information and Monitoring System. Is is based on the GMA from GGF, which is a simple Consumer-Producer model. The special strength of this implementation comes from the power of the relational model. We offer a global view of the information as if each Virtual Orga… ▽ More

    Submitted 15 August, 2003; originally announced August 2003.

    Comments: Talk given at UK e-Science All-Hands meeting, Nottingham, UK, September 2-4, 2003. 7 pages of LaTeX and 5 PNG figures

    ACM Class: H.2.4; H.m

  33. arXiv:cs/0306003  [pdf, ps, other

    cs.DC

    R-GMA: First results after deployment

    Authors: Rob Byrom, Brian Coghlan, Andrew W Cooke, Roney Cordenonsi, Linda Cornwall, Ari Datta, Abdeslem Djaoui, Laurence Field, Steve Fisher, Steve Hicks, Stuart Kenny, James Magowan, Werner Nutt, David O'Callaghan, Manfred Oevers, Norbert Podhorszki, John Ryan, Manish Soni, Paul Taylor, Antony J. Wilson, Xiaomei Zhu

    Abstract: We describe R-GMA (Relational Grid Monitoring Architecture) which is being developed within the European DataGrid Project as an Grid Information and Monitoring System. Is is based on the GMA from GGF, which is a simple Consumer-Producer model. The special strength of this implementation comes from the power of the relational model. We offer a global view of the information as if each VO had one… ▽ More

    Submitted 12 June, 2003; v1 submitted 30 May, 2003; originally announced June 2003.

    Comments: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 3 eps figures. PSN MOET004

    ACM Class: H.2.4; H.m