Atri Rudra

ORCID: 0000-0003-4136-4719
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • Complexity and Algorithms in Graphs
  • graph theory and CDMA systems
  • Advanced Database Systems and Queries
  • Data Management and Algorithms
  • DNA and Biological Computing
  • Optimization and Search Problems
  • Cryptography and Data Security
  • Cooperative Communication and Network Coding
  • Advanced Graph Theory Research
  • Error Correcting Code Techniques
  • Algorithms and Data Compression
  • Machine Learning and Algorithms
  • Sparse and Compressive Sensing Techniques
  • Cellular Automata and Applications
  • Neural Networks and Applications
  • Advanced biosensing and bioanalysis techniques
  • Auction Theory and Applications
  • Game Theory and Voting Systems
  • Bayesian Modeling and Causal Inference
  • Interconnection Networks and Systems
  • Parallel Computing and Optimization Techniques
  • Advanced Data Storage Technologies
  • Graph Theory and Algorithms
  • Distributed systems and fault tolerance

University at Buffalo, State University of New York
2015-2025

Stanford University
2019-2020

Buffalo State University
2011-2018

University of Michigan
2014

Bar-Ilan University
2012

New York University
2011

The University of Texas at Austin
2003-2009

University of Washington
2004-2007

IBM (United States)
2007

Seattle University
2005-2007

Transformers are slow and memory-hungry on long sequences, since the time memory complexity of self-attention quadratic in sequence length. Approximate attention methods have attempted to address this problem by trading off model quality reduce compute complexity, but often do not achieve wall-clock speedup. We argue that a missing principle is making algorithms IO-aware -- accounting for reads writes between levels GPU memory. propose FlashAttention, an exact algorithm uses tiling number...

10.48550/arxiv.2205.14135 preprint EN other-oa arXiv (Cornell University) 2022-01-01

column Share on Skew strikes back: new developments in the theory of join algorithms Authors: Hung Q Ngo University at Buffalo, SUNY SUNYView Profile , Christopher Ré Stanford UniversityView Atri Rudra Authors Info & Claims ACM SIGMOD RecordVolume 42Issue 4December 2013 pp 5–16https://doi.org/10.1145/2590989.2590991Online:28 February 2014Publication History 115citation817DownloadsMetricsTotal Citations115Total Downloads817Last 12 Months130Last 6 weeks16 Get Citation AlertsNew Alert...

10.1145/2590989.2590991 article EN ACM SIGMOD Record 2014-02-28

We present error-correcting codes that achieve the information-theoretically best possible trade-off between rate and error-correction radius.Specifically, for every 0 < R 1 ε > 0, we an explicit construction of can be list decoded in polynomial time up to a fraction (1-R-ε) worst-case errors.At least theoretically, this meets one central challenges algorithmic coding theory.Our are simple describe: they folded Reed-Solomon codes, which fact exactly (RS) but viewed as code over larger...

10.1109/tit.2007.911222 article EN IEEE Transactions on Information Theory 2008-01-01

Efficient join processing is one of the most fundamental and well-studied tasks in database research. In this work, we examine algorithms for natural queries over many relations describe a novel algorithm to process these optimally terms worst-case data complexity. Our result builds on recent work by Atserias, Grohe, Marx, who gave bounds size full conjunctive query sizes individual body query. These bounds, however, are not constructive: they rely Shearer's entropy inequality which...

10.1145/2213556.2213565 article EN 2012-05-21

We define and study the Functional Aggregate Query (FAQ) problem, which encompasses many frequently asked questions in constraint satisfaction, databases, matrix operations, probabilistic graphical models logic. This is our main conceptual contribution. then present a simple algorithm called "InsideOut" to solve this general problem. InsideOut variation of traditional dynamic programming approach for based on variable elimination. Our adds couple twists basic elimination order deal with...

10.1145/2902251.2902280 article EN 2016-06-15

Efficient join processing is one of the most fundamental and well-studied tasks in database research. In this work, we examine algorithms for natural queries over many relations describe a new algorithm to process these optimally terms worst-case data complexity. Our result builds on recent work by Atserias, Grohe, Marx, who gave bounds size query sizes individual body query. These bounds, however, are not constructive: they rely Shearer’s entropy inequality, which information-theoretic....

10.1145/3180143 article EN Journal of the ACM 2018-03-13

A central problem in learning from sequential data is representing cumulative history an incremental fashion as more processed. We introduce a general framework (HiPPO) for the online compression of continuous signals and discrete time series by projection onto polynomial bases. Given measure that specifies importance each step past, HiPPO produces optimal solution to natural function approximation problem. As special cases, our yields short derivation recent Legendre Memory Unit (LMU) first...

10.48550/arxiv.2008.07669 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Recurrent neural networks (RNNs), temporal convolutions, and differential equations (NDEs) are popular families of deep learning models for time-series data, each with unique strengths tradeoffs in modeling power computational efficiency. We introduce a simple sequence model inspired by control systems that generalizes these approaches while addressing their shortcomings. The Linear State-Space Layer (LSSL) maps $u \mapsto y$ simply simulating linear continuous-time state-space...

10.48550/arxiv.2110.13985 preprint EN other-oa arXiv (Cornell University) 2021-01-01

10.1016/j.tcs.2004.05.012 article EN publisher-specific-oa Theoretical Computer Science 2004-06-22

We consider the following simple algorithm for feedback arc set problem in weighted tournaments --- order vertices by their indegrees. show that this has an approximation guarantee of 5 if weights satisfy probability constraints (for any pair u and v, wuv + wvu = 1). Special cases such include unweighted rank aggregation. Finally, constant e > 0, we exhibit infinite family (unweighted) which above (irrespective how ties are broken) ratio - e.

10.5555/1109557.1109642 article EN Symposium on Discrete Algorithms 2006-01-22

We consider the following "efficiently decodable" non-adaptive group testing problem. There is an unknown string x ∊ {0, 1}n with at most d ones in it. are allowed to test any subset S ⊆ [n] of indices. The answer tells whether xi = 0 for all i or not. objective design as few tests possible (say, t tests) such that can be identified fast poly(t)-time). Efficiently decodable has applications many areas, including data stream algorithms and forensics.A strategy represented by a × n matrix,...

10.1137/1.9781611973075.91 article EN 2010-01-17

State space models (SSMs) have demonstrated state-of-the-art sequence modeling performance in some modalities, but underperform attention language modeling. Moreover, despite scaling nearly linearly length instead of quadratically, SSMs are still slower than Transformers due to poor hardware utilization. In this paper, we make progress on understanding the expressivity gap between and modeling, reducing barrier attention. First, use synthetic tasks understand We find that existing struggle...

10.48550/arxiv.2212.14052 preprint EN other-oa arXiv (Cornell University) 2022-01-01

We consider the following efficiently decodable non-adaptive group testing problem. There is an unknown string x ∈ {0, 1}n with at most d ones in it. are allowed to test any subset S ⊆ [n] of indices. The answer tells whether xi = 0 for all i or not. objective design as few tests possible (say, t tests) such that can be identified fast poly(t)-time). Efficiently has applications many areas, including data stream algorithms and forensics.A strategy represented by a n matrix, which stacking...

10.5555/1873601.1873692 article EN 2010-01-17

Energy consumption has emerged as a first class computing resource for both server systems and personal devices. The growing importance of energy led to rethink in hardware design, hypervisors, operating compilers. Algorithm design is still relatively untouched by the algorithmic complexity models do not capture consumed an algorithm. In this paper, we propose new model account used Based on abstract memory (which was inspired popular DDR3 similar parallel disk I/O Vitter Shriver), present...

10.1145/2422436.2422470 article EN 2013-01-03

Join optimization has been dominated by Selinger-style, pairwise optimizers for decades. But, Selinger-style algorithms are asymptotically suboptimal applications in graphic analytics. This sub-optimality is one of the reasons that many have advocated supplementing relational engines with specialized graph processing engines. Recently, new join discovered achieve optimal worst-case run times any or even so-called beyond (or instance optimal) time guarantees classes joins. These match improve...

10.1145/2764947.2764948 article EN 2015-05-31

Teaching applied ethics in computer science has shifted from a perspective of teaching about professional codes conduct and an emphasis on risk management towards broader understanding the impacts computing humanity environment principles practices responsible computing. One primary shifts approach to comes research social sciences humanities. This position is grounded idea that all artifacts, projects, tools, products are situated within set ideas, attitudes, goals, cultural norms. means...

10.48550/arxiv.2502.10856 preprint EN arXiv (Cornell University) 2025-02-15

For every 0 < R 1 and ε > 0, we present an explicit construction of error-correcting codes rate that can be list decoded in polynomial time up to a fraction (1-R-ε) errors. These achieve the "capacity" for decoding from adversarial errors, i.e., optimal trade-off between error-correction radius. At least theoretically, this meets one central challenges coding theory.Prior work, achieving capacity were not known any R. In fact, our are first beat radius 1-√R, was achieved Reed-Solomon (RS)...

10.1145/1132516.1132518 article EN 2006-05-21

The primary goal of compressed sensing and (non-adaptive) combinatorial group testing is to recover a sparse vector x from an underdetermined set linear equations Φx = y. Both problems entail solving y given Φ but they use different models arithmetic, randomness for F, guarantees upon the solution class signals which drawn. In [1], Lipton introduced model error correction where channel computationally bounded, subject standard cryptographic assumptions, produces that must be found then...

10.1109/ita.2012.6181772 article EN 2012-02-01

We show that any q-ary code with sufficiently good distance can be randomly punctured to obtain, high probability, a is list decodable up radius 1 --- 1/q ε near-optimal rate and sizes.

10.1145/2591796.2591797 article EN 2014-05-31
Coming Soon ...