David Culler
YOU?
Author Swipe
View article: IC-Cache: Efficient Large Language Model Serving via In-context Caching
IC-Cache: Efficient Large Language Model Serving via In-context Caching Open
Large language models (LLMs) have excelled in various applications, yet serving them at scale is challenging due to their substantial resource demands and high latency. Our real-world studies reveal that over 70% of user requests to LLMs h…
View article: Membrane: A Cryptographic Access Control System for Data Lakes
Membrane: A Cryptographic Access Control System for Data Lakes Open
Organizations use data lakes to store and analyze sensitive data. But hackers may compromise data lake storage to bypass access controls and access sensitive data. To address this, we propose Membrane, a system that (1) cryptographically e…
View article: Spark Transformer: Reactivating Sparsity in FFN and Attention
Spark Transformer: Reactivating Sparsity in FFN and Attention Open
The discovery of the lazy neuron phenomenon in trained Transformers, where the vast majority of neurons in their feed-forward networks (FFN) are inactive for each token, has spurred tremendous interests in activation sparsity for enhancing…
View article: Concorde: Fast and Accurate CPU Performance Modeling with Compositional Analytical-ML Fusion
Concorde: Fast and Accurate CPU Performance Modeling with Compositional Analytical-ML Fusion Open
Cycle-level simulators such as gem5 are widely used in microarchitecture design, but they are prohibitively slow for large-scale design space explorations. We present Concorde, a new methodology for learning fast and accurate performance m…
View article: A Novel High-Fidelity Simulation for Finishing Operations: Hybrid Image Mosaic and Wavelet Decomposition
A Novel High-Fidelity Simulation for Finishing Operations: Hybrid Image Mosaic and Wavelet Decomposition Open
In finishing simulations, achieving accurate results can be challenging due to the minimal amount of material removal and the limited measurement range of surface micro-topography instruments. To overcome these limitations, a novel high-fi…
View article: CC-NIC: a Cache-Coherent Interface to the NIC
CC-NIC: a Cache-Coherent Interface to the NIC Open
Emerging interconnects make peripherals, such as the network interface controller (NIC), accessible through the processor's cache hierarchy, allowing these devices to participate in the CPU cache coherence protocol. This is a fundamental c…
View article: A Cloud-Scale Characterization of Remote Procedure Calls
A Cloud-Scale Characterization of Remote Procedure Calls Open
The global scale and challenging requirements of modern cloud applications have led to the development of complex, widely distributed, service-oriented applications. One enabler of such applications is the remote procedure call (RPC), whic…
View article: Lovelock: Towards Smart NIC-hosted Clusters
Lovelock: Towards Smart NIC-hosted Clusters Open
Traditional cluster designs were originally server-centric, and have evolved recently to support hardware acceleration and storage disaggregation. In applications that leverage acceleration, the server CPU performs the role of orchestratin…
View article: Towards an Adaptable Systems Architecture for Memory Tiering at Warehouse-Scale
Towards an Adaptable Systems Architecture for Memory Tiering at Warehouse-Scale Open
Fast DRAM increasingly dominates infrastructure spend in large scale computing environments and this trend will likely worsen without an architectural shift. The cost of deployed memory can be reduced by replacing part of the conventional …
View article: Understanding host interconnect congestion
Understanding host interconnect congestion Open
We present evidence and characterization of host congestion in production clusters: adoption of high-bandwidth access links leading to emergence of bottlenecks within the host interconnect (NIC-to-CPU data path). We demonstrate that conten…
View article: Hamilton: Flexible, Open Source $10 Wireless Sensor System for Energy Efficient Building Operation
Hamilton: Flexible, Open Source $10 Wireless Sensor System for Energy Efficient Building Operation Open
Sensors for improving building performance are rapidly populating the market, driven in part by the drive to reduce greenhouse gas emissions resulting from energy production as well as improve the interior environment for healthy and more …
View article: Dealing with expected thermal discomfort
Dealing with expected thermal discomfort Open
Author(s): Panagopoulos, Athanasios Aris; Katsigiannis, Michail; Pritoni, Marco; Fierro, Gabriel; Lengyel, Daniel; Peffer, Therese; Chalkiadakis, Georgios; Culler, David
View article: MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation
MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation Open
Secure Computation (SC) is a family of cryptographic primitives for computing on encrypted data in single-party and multi-party settings. SC is being increasingly adopted by industry for a variety of applications. A significant obstacle to…
View article: Mr. Plotter: Unifying Data Reduction Techniques in Storage and Visualization Systems
Mr. Plotter: Unifying Data Reduction Techniques in Storage and Visualization Systems Open
As the rate of data collection continues to grow rapidly, developing visualization tools that scale to immense data sets is a serious and ever-increasing challenge. Existing approaches generally seek to decouple storage and visualization s…
View article: Cores that don't count
Cores that don't count Open
We are accustomed to thinking of computers as fail-stop, especially the cores that execute instructions, and most system software implicitly relies on that assumption. During most of the VLSI era, processors that passed manufacturing tests…
View article: Revitalizing the public internet by making it extensible
Revitalizing the public internet by making it extensible Open
There is now a significant and growing functional gap between the public Internet, whose basic architecture has remained unchanged for several decades, and a new generation of more sophisticated private networks. To address this increasing…
View article: Shepherding Metadata Through the Building Lifecycle
Shepherding Metadata Through the Building Lifecycle Open
Many different digital representations of a building are produced over the course of its lifecycle. These representations contain the metadata required to support different stages of the building, from initial planning and design, to const…
View article: Interactive Metadata Integration with Brick
Interactive Metadata Integration with Brick Open
Many different digital representations of a building are produced over the course of its lifecycle. While these representations individually contain metadata required to support different stages of the building's lifecycle, they are largel…
View article: A low-complexity non-intrusive approach to predict the energy demand of buildings over short-term horizons
A low-complexity non-intrusive approach to predict the energy demand of buildings over short-term horizons Open
Reliable, non-intrusive, short-term (of up to 12 hours ahead) prediction of a building's energy demand is a critical component of intelligent energy management applications. A number of such approaches have been proposed over time, utilizi…
View article: Formalizing Tag-Based Metadata With the Brick Ontology
Formalizing Tag-Based Metadata With the Brick Ontology Open
Current efforts establishing semantic metadata standards for the built environment span academia, industry and standards bodies. For these standards to be effective, they must be clearly defined and easily extensible, encourage consistency…
View article: An Engineering Pedagogy for Developing Practical Knowledge and Hands-On Skills Related to 5-Axis Milling and Computer-Aided Aerospace Parts Manufacturing Using Current Technology
An Engineering Pedagogy for Developing Practical Knowledge and Hands-On Skills Related to 5-Axis Milling and Computer-Aided Aerospace Parts Manufacturing Using Current Technology Open
Student Paper: Abstract The implementation and effective utilization of advanced computer controlled machines and processes depends on a concerted effort by industry, machine and software vendors, and educators. Specialized and multipurpos…
View article: A Proposal to Implement a Course on Vision Systems with Applications in Robotics at the Oregon Institute of Technology
A Proposal to Implement a Course on Vision Systems with Applications in Robotics at the Oregon Institute of Technology Open
Applications and Areas of Study Related to Vision Systems for Engineering Technology StudentsMany modern automated systems incorporate aspects of and tools based on vision and cameratechnologies. Robotics, material handling systems, survei…
View article: Development Of A Generic Communication Service Between Programmable Logic Controllers And Personal Computers Using Microsoft Robotics Developer Studio For Data Collection In Automated And Semi Automated Manufacturing Processes
Development Of A Generic Communication Service Between Programmable Logic Controllers And Personal Computers Using Microsoft Robotics Developer Studio For Data Collection In Automated And Semi Automated Manufacturing Processes Open
NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract Development of a Generic Communication Service Between Programmable Logic Controllers and Personal Computers using Microsoft Robotics D…
View article: Design And Construction Of A Rapid Prototyping Machine: A Breakdown Of The Machine Subsystems Used To Learn Multidisciplinary Engineering Skills
Design And Construction Of A Rapid Prototyping Machine: A Breakdown Of The Machine Subsystems Used To Learn Multidisciplinary Engineering Skills Open
NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract Design and Construction of a Rapid Prototyping Machine: A Breakdown of the Machine Sub-Systems Used to Learn Multi-Disciplinary Enginee…
View article: CoVista: A Unified View on Privacy Sensitive Mobile Contact Tracing Effort
CoVista: A Unified View on Privacy Sensitive Mobile Contact Tracing Effort Open
Governments around the world have become increasingly frustrated with tech giants dictating public health policy. The software created by Apple and Google enables individuals to track their own potential exposure through collated exposure …
View article: PC-RPL
PC-RPL Open
We present PC-RPL , a transmission power-controlled IPv6 routing protocol for low-power and lossy wireless networks that significantly improves the end-to-end packet delivery performance under heavy traffic compared to the standard RPL. We…
View article: Core Concepts, Challenges, and Future Directions in Blockchain
Core Concepts, Challenges, and Future Directions in Blockchain Open
Blockchains are a topic of immense interest in academia and industry, but their true nature is often obscured by marketing and hype. In this tutorial, we explain the fundamental elements of blockchains. We discuss their ability to achieve …
View article: Mortar
Mortar Open
Access to large amounts of real-world data has long been a barrier to the development and evaluation of analytics applications for the built environment. Open datasets exist, but they are limited in their span (how much data is available) …