Parallel Factorization of Boolean Polynomials

Author(s):  
Vadiraj Kulkarni ◽  
Pavel Emelyanov ◽  
Denis Ponomaryov ◽  
Madhava Krishna ◽  
Soumyendu Raha ◽  
...  
2011 ◽  
Vol 148-149 ◽  
pp. 1370-1373 ◽  
Author(s):  
Liang Wang ◽  
Yi Sheng Zhang ◽  
Bin Zhu ◽  
Chi Xu ◽  
Xiao Wei Tian ◽  
...  

One of the fundamental problems in scientific computing is to find solutions for linear equation systems. For finite element problem, Cholesky factorization is often used to solve symmetric positive definite matrices. In this paper, Cholesky factorization is massively parallelized and three different optimization methods - highly parallel factorization, tile strategy and memory scheduling are used to accelerate Cholesky factorization effectively. A novel algorithm using OpenCL is implemented. Testing on GPU shows that performance of the algorithm increases with the dimension of matrix, reaching 785.41GFlops, about 50x times speedup. Cholesky factorization is remarkably improved with OpenCL on GPU.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Jiwei Tian ◽  
Buhong Wang ◽  
Xia Li

Recent researches on data-driven and low-sparsity data injection attacks have been presented, respectively. To combine the two main goals (data-driven and low-sparsity) of research, this paper presents a data-driven and low-sparsity false data injection attack strategy. The proposed attacking strategy (EID: Eliminate-Infer-Determine) is divided into three stages. In the first step, the intercepted data is preprocessed by sparse optimization techniques to eliminate the outliers. The recovered data is then exploited to learn about the system matrix based on the parallel factorization algorithm in the second step. In the third step, the approximated system matrix is applied for the design of sparse attack vector based on the convex optimization. The simulation results show that the EID attack strategy achieves a better performance than the improved ICA-based attack strategy in constructing perfect sparse attack vectors. What is more, data-driven implementation of the proposed strategy is also presented which ensures attack performance even without the prior information of the system.


1989 ◽  
Vol 10 (6) ◽  
pp. 1146-1173 ◽  
Author(s):  
John G. Lewis ◽  
Barry W. Peyton ◽  
Alex Pothen

Sign in / Sign up

Export Citation Format

Share Document