1. 2 6 5 0 B F 4 A 2 C C C 2 1 5 3
  2. 5 E F 8 7 1 9 D 9 4 1 F E 2 C C
  3. B 3 5 5 E A D C 9 C 7 7 B F B 7
  4. 5 4 F 0 B 8 8 A 5 B D 8 E 0 8 6
  5. 3 0 1 9 B F 5 5 9 A 3 D 7 0 4 A
  6. 3 4 2 4 4 5 3 E A 8 2 8 1 7 7 5
  7. A 1 C 7 E 6 9 F C B C 2 4 8 7 8
  8. 0 3 E 2 4 3 6 8 A C C A 6 3 F 7
Title
Conspectus 12023 Q1
Subtitle
Chronical - V
Author
Recursion Ninja
Date
12023+079 Monday, March 20
Word Count
1457 (ERT 6 min)
Code Lines
0
Formats

Quarter 1: Winter Solstice to Vernal Equinox

Doctoral Program

Coursework has again formed the preponderance of my doctoral program this semester. For the spring 2023 semester I have enrolled in:

  • CSci 75100 – Logic in CS
  • CSci 80010 – Research Seminar
  • CSci 85011 – Distributed Computing
  • PHIL 76600 – First-Order Modal Logic

Enrollment in 13 credits is a great undertaking, especially while adamantly pushing for small progress of research objectives. Despite my heavy workload, I have achieved modest progress on developing supporting infrastructure for program synthesis research. This infrastructure will facilitate my anticipated direction of research during the summer.

TreeKEM Formal Verification

Multiple soundness preserving abstractions have been composed together. Additionally model encoding utilizing “bit-packing” and “bit-twiddling” techniques have been finalized. Subsequently, I dispatched multiple series of benchmarking to determine the optimal (with respect to scalability) compile-time directives and runtime flag provided by Spin to verify the newly encoded model.

Scaling of the new model encoding, under the metric of state vector s⃗ size in bytes, are astronomically superior to the results of my masters thesis. Recall that within the model exists a (T, C, N) adversary 𝒜 who attempts to glean some information from the TreeKEM cryptographic protocol shared by a group of up to N unique participants over at most T communication epochs, and utilizing at most C challenge queries. The old model encoding old(T, N, ℙ) from my masters thesis, verifies that holds C ∈ [1, T] ⊂ ℕ the property holds against a (T, C, N) adversary 𝒜. The new model encoding new(N, ℙ) verifies that T ∈ ℕ and C ∈ [1, T] the property holds against a (T, C, N) adversary 𝒜.

new old new old new old
N T s⃗ T s⃗ N T s⃗ T s⃗ N T s⃗ T s⃗
4 56 B 4 192 B 7 68 B 4 224 B 10 68 B 4 260 B
5 240 B 5 296 B 5 352 B
6 248 B 6 304 B 6 352 B
7 248 B 7 304 B 7 360 B
8 268 B 8 316 B 8 372 B



5 64 B 4 200 B 8 88 B 4 236 B 11 88 B 4 268 B
5 264 B 5 312 B 5 368 B
6 264 B 6 320 B 6 376 B
7 264 B 7 320 B 7 376 B
8 284 B 8 340 B 8 388 B



6 64 B 4 216 B 9 88 B 4 244 B 12 88 B 4 276 B
5 280 B 5 336 B 5 384 B
6 280 B 6 336 B 6 392 B
7 288 B 7 336 B 7 392 B
8 300 B 8 356 B 8 412 B

These results will be presented in a manuscript I am preparing for publication.

Project Euler

Some of my peers have been utilizing Project Euler as a set of sample problems to solve while learning new languages. I have used this opportunity to dive back in and continue my progression by participating with them. Interestingly, they have not chosen the easier problems from the beginning of the archive. Rather, they have select problems from the 200 range. The combinatorics required to solve Problem 205 was a refreshing experience in recurrence relations and dynamic programming. Similarly, when solving Problem 206 I appreciated applying number theory to prune the search space rather than employing brute force search.

AMNH Research Associate

My collaboration with Wheeler Lab at AMNH has, at long last, culminated in a manuscript submitted for publication. We define a representation of phylogenetic networks with minor restrictions on character coding and describe an accompanying algorithm for computing an efficient scoring measure of said networks utilizing memoization of shared substructures. The network restrictions specify the concept of character blocks which are atomically optimized and the scoring algorithm introduces a network edge penalty. The conjunction of these results in a optimization procedure which searches over the space of (constrained) phylogenetic networks, yet does not yield a trivial result with many “reticulated” edges. The manuscript has been submitted for publication in Cladistics.

A second manuscript is in preparation announcing the lab’s next-generation, multi-purpose phylogenetic analysis software program along with an open source library toolkit. This manuscript describes the scope of the software’s capabilities and compares the capabilities to those of existing related software programs. The software support the two dominant forms of phylogenetic analysis, parsimony and [maximum likelihood][Wiki-Phylo-MaxL Importantly, the manuscript includes a description of how to utilize our program to evaluate phylogenetic networks with the scoring algorithm recently submitted for publication. A notable feature of the software, from my perspective, is that it is written in Haskell.

Finally, I have been engaged in some intermittent consulting related to performance tuning Haskell code within our software program and the accompanying toolkit. One interesting problems involved ensuring large objects are do not have lingering references from a stack-frame of a deep, recursive call stack. Another encompassed 𝒪( 1 ) bidirectional marshalling of data-structures across the C FFI. Undoubtedly, more performance tuning will follow over the coming months as the lab’s labors are publicized to the wider world.