How to Various rules for how not to behave Kathy Yelick - PowerPoint PPT Presentation

1 / 52
About This Presentation
Title:

How to Various rules for how not to behave Kathy Yelick

Description:

Twelve Ways to Fool the Masses: Scientific Malpractice in High ... priceless. ... Your ideas are priceless. My Space-Efficient Poster: Make sure to cover ... – PowerPoint PPT presentation

Number of Views:102
Avg rating:3.0/5.0
Slides: 53
Provided by: ianf170
Category:

less

Transcript and Presenter's Notes

Title: How to Various rules for how not to behave Kathy Yelick


1
How to Various rules for how (not) to
behaveKathy Yelick
  • Derived from
  • How to Give a Bad talk The Ten Commandments
  • by David A. Patterson (slides by Rolf Riedi)
  • Twelve Ways to Fool the Masses Scientific
    Malpractice in High-Performance Computing
  • by David Bailey

2
1. Thou shalt not waste space
  • Poster board is expensive.
  • Your ideas are priceless.

My Space-Efficient Poster Make sure to cover all
white space -- no borders, or other separating
between topics. Minimize line spacing. Use the
minimum font legible visible from 1 foot away.
3
1. Thou shalt not waste space
  • Poster board is expensive.
  • Your ideas are priceless.
  • My Space-Efficient Poster
  • Make sure to cover all white space
  • no borders, or other separating between topics.
  • Minimize line spacing.
  • Use the minimum font legible visible from 1 foot
    away.

4
2. Thou shalt not be neat
  • Why vaste research time on prepare poster?
  • Ignore spellg, grammer and legibilite.

Who cares what 30 people think?
5
2. Thou shalt not be neat
  • Why waste research time on preparing slides?
  • Ignore spelling, grammar and legibility.

Who cares what 30 people think?
6
3. Thou shalt not covet brevity
  • Do you want to promote the stereotype that
    computer scientists can't write? Always use
    complete sentences, never just key words. If
    possible, use whole paragraphs to make sure your
    visitors will have to stand by your poster for a
    long time just to read the text.

7
3. Thou shalt not covet brevity
  • Use key words.
  • Dont plan to read your poster.

8
4. Omit needless background
  • Assume you will always be present
  • No need for the poster to tell its own story
  • Dont both to label graphs you memory is fine
  • Use inside lingo (e.g., Bassi, PSI, my laptop)

9
4. Omit needless background
  • Write poster to be reused without you
  • Critical information should be there
  • Label all axes on graphs (Mflop/sec not
    speed)
  • Use globally terminology (e.g., IBM Power5 with
    Federation switch or Pentium 4 with Gigabit
    Ethernet)

10
5. Covet Content over Structure
  • Just get the facts on the poster, dont worry
    about placement
  • Humans can be trained to read right-to-left,
    bottom-to-top, or any other order
  • Experience with foreign languages proves this

What we would do with more time
Results on 8 processors
Outline of our planned solutions
Why this problem is important
11
6. Thou shalt not use color
  • Flagrant use of color indicates uncareful
    research.
  • It's also unfair to emphasize some words over
    others.
  • Aside Using color doesnt mea a fancy plotter

12
7. Thou shalt not illustrate
  • Confucius says
  • A picture is a 1000 words,''
  • but Dijkstra says
  • Pictures are for weak minds.'
  • Who are you going to believe?
  • Wisdom from the ages or
  • the person who first counted goto's?

13
8. Let the Poster Speak for Itself
  • Do not stand near your poster
  • Do not think about what youre going to say to
    visitors
  • If you worked in a team, let your partner do all
    the talking

14
9. Reuse, Recycle, Reclaim
  • Once the paper is written, you can just glue the
    pages to the poster board, right?

15
10. Do Not Plan Ahead
  • Why waste research time thinking about the
    poster?
  • It could take an hours out of your several weeks
    of project work.
  • How can you appear spontaneous if you plan ahead?
  • Dont worry about presentation when youre
    collecting results
  • Dont get any feedback on your results
  • Commandment X is most important.
  • Even if you break the other nine, this one can
    save you.

16
Twelve Ways to Fool the Masses Scientific
Malpractice in High-Performance Computing David
H. Bailey Lawrence Berkeley National
Laboratory http//crd.lbl.gov/dhbailey
17
Lessons From History
  • High standards of honesty and scientific rigor
    must be vigilantly enforced within a field.
  • Rigorous peer review is essential.
  • Scientific research must be based on solid
    empirical data and careful, objective analysis of
    that data.
  • Scientists must be willing to provide all details
    of the experimental environment, so others can
    reproduce their results.
  • A politically correct conclusion is no excuse
    for poor scholarship.
  • Erudite-sounding technical terminology and fancy
    mathematical formulas are no substitutes for
    sound reasoning.
  • Hype has no place in the scientific enterprise.
  • There is a real world its properties are not
    social constructs facts and evidence do matter.
    Sokal

18
History of Parallel Computing
  • 1976-1986 Initial research studies and demos.
  • 1986-1990 First large-scale systems deployed.
  • 1990-1994 Successes over-hyped faults ignored.
    Shoddy measurement methods used.
    Questionable performance claims made.
  • 1994-1998 Numerous firms fail agencies cut
    funds.
  • 1998-2002 Reassessment.
  • 2002-2006 Recovering? Or slipping again into
    hype?

19
Parallel System Performance Practices, circa 1990
  • Performance results on small-sized parallel
    systems were linearly scaled to full-sized
    systems.
  • Example 8,192-CPU results were linearly scaled
    to 65,536-CPU results, simply by multiplying by
    8.
  • Rationale We cant afford a full-sized system.
  • Sometimes this was done without any clear
    disclosure in the paper or presentation.

20
Parallel System Performance Practices, circa 1990
  • Highly tuned programs were compared with untuned
    implementations on other systems.
  • In comparisons with vector systems, often little
    or no effort was made to tune the vector code.
  • This was the case even for comparisons with SIMD
    parallel systems here the SIMD code can be
    directly converted to efficient vector code.

21
Parallel System Performance Practices, circa 1990
  • Inefficient algorithms were employed, requiring
    many more operations, in order to exhibit an
    artificially high Mflop/s rate.
  • Some scientists employed explicit PDE schemes for
    applications where implicit schemes were known to
    be much better.
  • One paper described doing a discrete Fourier
    transform by direct computation, rather than by
    using an FFT (8n2 operations rather than 5n
    log2n).

22
Parallel System Performance Practices, circa 1990
  • Performance rates on 32-bit floating-point data
    on one system were compared with rates on 64-bit
    data on other systems.
  • Using 32-bit data instead of 64-bit data
    effectively doubles data bandwidth, thus yielding
    artificially high performance rates.
  • Some computations can be done safely with 32-bit
    floating-point arithmetic, but most cannot.
  • Even 64-bit floating-point arithmetic is not
    enough for some scientific applications 128-bit
    is required.

23
Parallel System Performance Practices, circa 1990
  • In some cases, performance experiments reported
    in published results were not actually performed.
  • Abstract of published paper
  • The current Connection Machine implementation
    runs at 300-800 Mflop/s on a full 64K CM-2, or
    at the speed of a single processor of a Cray-2 on
    1/4 of a CM-2.
  • Buried in text
  • This computation requires 568 iterations
    (taking 272 seconds) on a 16K Connection
    Machine.
  • I.e., the computation was not run on a full 64K
    CM-2.
  • In contrast, a Convex C210 requires 909 seconds
    to compute this example. Experience indicates
    that for a wide range of problems, a C210 is
    about 1/4 the speed of a single processor Cray-2,
  • I.e., the computation was not run on a Cray-2 at
    all it was run on a Convex system, and a very
    dubious conversion factor was used.

24
Parallel System Performance Practices, circa 1990
  • Scientists were just as guilty as commercial
    vendors of questionable performance claims.
  • The examples in my files were written by
    professional scientists and published in
    peer-reviewed journals and conference
    proceedings.
  • One example is from an award-winning paper.
  • Scientists in some cases accepted free computer
    time or research funds from vendors, but did not
    disclose this fact in their papers.
  • Scientists should be held to a higher standard
    than vendor marketing personnel.

25
Performance Plot A
26
Data for Plot A
  • Total Parallel system Vector system
  • Objects Run time Run time
  • 20 818 016
  • 40 911 026
  • 80 1159 057
  • 160 1507 211
  • 990 2132 1900
  • 9600 3136 31150
  • Notes
  • In last entry, the 31150 figure is an estimate.
  • The vector system code is not optimized.
  • The vector system performance is better except
    for the last (estimated) entry.

27
Performance Plot B
28
Facts for Plot B
  • 32-bit performance rates on a parallel system are
    compared with 64-bit performance on a vector
    system.
  • Parallel system results are linearly extrapolated
    to a full-sized system from a small system (only
    1/8 size).
  • The vector version of code is unvectorized.
  • The vector system curves are straight lines
    i.e., they are linear extrapolations from a
    single data point.
  • Summary
  • It appears that of all points on four curves in
    this plot, at most four points represent real
    timings.

29
Twelve Ways to Fool the Masses
  • Quote only 32-bit performance results, not 64-bit
    results.
  • Present performance figures for an inner kernel,
    and then represent these figures as the
    performance of the entire application.
  • Quietly employ assembly code and other low-level
    language constructs.
  • Scale up the problem size with the number of
    processors, but omit any mention of this fact.
  • Quote performance results projected to a full
    system.
  • Compare your results against scalar, unoptimized
    code on conventional systems.
  • When direct run time comparisons are required,
    compare with an old code on an obsolete system.
  • If Mflop/s rates must be quoted, base the
    operation count on the parallel implementation,
    not on the best sequential implementation.
  • Quote performance in terms of processor
    utilization, parallel speedups or Mflop/s per
    dollar.
  • Mutilate the algorithm used in the parallel
    implementation to match the architecture.
  • Measure parallel run times on a dedicated system,
    but measure conventional run times in a busy
    environment.
  • If all else fails, show pretty pictures and
    animated videos, and don't talk about performance.

30
Twelve Ways Basic Principles
  • Use well-understood, community-defined metrics.
  • Base performance rates on operation counts
    derived from the best practical serial
    algorithms, not on schemes chosen just to exhibit
    artificially high Mflop/s rates on a particular
    system.
  • Use comparable levels of tuning.
  • Provide full details of experimental environment,
    so that performance results can be reproduced by
    others.
  • Disclose any details that might affect an
    objective interpretation of the results.
  • Honesty and reproducibility should characterize
    all work.
  • Danger We can fool ourselves, as well as others.

31
New York Times, 22 Sept 1991
32
Excerpts from NYT Article
  • Rival supercomputer and work station
    manufacturers are prone to hype, choosing the
    performance figures that make their own systems
    look better.
  • Its not really to the point of widespread
    fraud, but if people arent somewhat more
    circumspect, it could give the field a bad name.

33
Fast Forward to 2007 Five New Ways to Fool the
Masses
  • Dozens of runs are made, but only the best
    performance figure is cited in the paper.
  • Runs are made on part of an otherwise idle
    system, but this is not disclosed in the paper.
  • Performance rates are cited for a run with only
    one CPU active per node.
  • Special hardware, operating system or compiler
    settings are used that are not appropriate for
    real-world usage.
  • Scalability is defined as a successful
    execution on a large number of CPUs, regardless
    of performance.

34
Extra Slides
35
Example from PhysicsMeasurements of Speed of
Light
Why the discrepancy between pre-1945 and
post-1945 values? Probably due to biases and
sloppy experimental methods.
36
Example from Psychology The Blank Slate
  • The blank slate paradigm (1920-1990)
  • The human mind at birth is a blank slate.
  • Heredity and biology play no significant role in
    human personality all behavioral traits are
    socially constructed.
  • Current consensus, based on latest research
  • Humans at birth possess sophisticated facilities
    for language acquisition, pattern recognition and
    social life.
  • Heredity, evolution and biology are major factors
    of personality development.
  • How did these scientists get it so wrong?
  • Sloppy experimental methodology and analysis.
  • Pervasive biases and wishful thinking.
  • Ref Steven Pinker, The Blank Slate The Modern
    Denial of Human Nature

37
Example from AnthropologyThe Noble Savage
  • Anthropologists, beginning with Margaret Mead in
    the 1930s, taught that primitive societies (such
    as South Sea Islands) were idyllic
  • No violence, jealousy or warfare.
  • Happy, uninhibited no psychological problems or
    hangups.
  • Beginning in the 1980s, a new breed of
    anthropologists began to reexamine these
    findings. They concluded
  • Most of these societies have murder rates several
    times higher than large U.S. cities.
  • Death rates from inter-tribe warfare exceed that
    of Western societies by factors of 10 to 100.
  • Complex, jealous taboos surround courtship and
    marriage, often justifying the killing of
    non-virgin brides or suspected adulterers.
  • Why were the earlier studies so wrong?
  • Answer Anthropological malpractice Pinker

38
Postmodern Science Studies
  • These scholars study the social and political
    factors involved in scientific discoveries. Some
    of these studies are interesting and useful, but
    others are highly questionable
  • Denials that science progresses towards
    fundamental truth.
  • Claims that scientific theories are socially
    constructed.
  • Politically charged rhetoric.
  • Gratuitous use of erudite-sounding technical
    jargon.
  • Significant misunderstandings of the mathematical
    and scientific topics being addressed.
  • Application of arcane theories of math and
    physics into inappropriate arenas.
  • Reluctance to submit scholarship to rigorous
    outside review.
  • Ref Fashionable Nonsense by Alan Sokal and Jean
    Bricmont

39
The Sokal Hoax
  • In 1996, Alan Sokal, a physicist at NYU, wrote a
    spoof of a postmodern science article, entitled
    Transgressing the Boundaries Toward a
    Transformative Hermeneutics of Quantum Gravity
  • Page after page of erudite-sounding nonsense.
  • Numerous references to arcane scientific
    theories, including quantum mechanics,
    relativity, chaos theory, mathematical set
    theory, etc.
  • Frequent, approving quotes from leading
    postmodern science scholars.
  • Politically charged rhetoric.
  • Deliberately written so that any mathematician
    or physicist would realize that it was a spoof.
  • In spite of its these flaws, the article was
    accepted for publication in Social Text, a
    leading postmodern journal. It appeared in a
    special issue devoted to defending the science
    studies field against its detractors.

40
Excerpts from Sokals Article
  • Rather, scientists cling to the dogma that
    there exists an external world, whose properties
    are independent of any individual human being and
    indeed of humanity as a whole that these
    properties are encoded in eternal physical
    laws and that human beings can obtain reliable,
    albeit imperfect and tentative, knowledge of
    these laws by hewing to the objective
    procedures and epistemological strictures
    prescribed by the (so-called) scientific method.
    pg 217 Note Sokal is deriding even the most
    basic notions of scientific reality and common
    sense.
  • In this way the infinite-dimensional invariance
    group erodes the distinction between the observer
    and observed the p of Euclid and the G of
    Newton, formerly thought to be constant and
    universal, are now perceived in their ineluctable
    historicity and the putative observer becomes
    fatally de-centered, disconnected from any
    epistemic link to a space-time point that can no
    longer be defined by geometry alone. pg 222
    Note In addition to gratuitous usage of
    technical jargon, Sokal is saying that p and G
    are not constants!

41
Excerpts from Other (Serious) Articles in the
Same Issue as Sokals Article
  • Most theoretical physicists, for example,
    sincerely believe that however partial our
    collective knowledge may be, ... one day
    scientists shall find the necessary correlation
    between wave and particle the unified field
    theory of matter and energy will transcend
    Heisenbergs uncertainly principle. Aronowitz,
    pg 181 Note A unified field theory will not
    do away with wave-particle duality and
    Heisenbergs uncertainty principle these are
    inherent in quantum theory.
  • Passionate partisans of wave and matrix
    mechanics explanations for the behavior of
    electrons were unable to reach agreement for
    decades. Aronowitz, pg 195 Note Even
    Aronowitzs history is wrong wave and matrix
    formulations of quantum mechanics were reconciled
    within weeks.
  • Once it is acknowledged that the West does not
    have a monopoly on all the good scientific ideas
    in the world, or that reason, divorced from
    value, is not everywhere and always a productive
    human principle, then we should expect to see
    some self-modification of the universalist claims
    maintained on behalf of empirical rationality.
    Only then can we begin to talk about different
    ways of doing science, ways that downgrade
    methodology, experiment, and manufacturing in
    favor of local environments, cultural values, and
    principles of social justice. Ross, pg 3-4
    Note Ross is advocating an extreme cultural
    relativism for science, discarding much of our
    rational, empirical methodology.

42
2005 A Sokal-Like Hoax in Computer Science
  • In early 2005, some MIT graduate students
    submitted two papers to the 9th World
    Multi-Conference on Systemics, Cybernetics and
    Informatics (WMSCI).
  • Rooter A Methodology for the Typical
    Unification of Access Points and Redundancy
  • The Influence of Probabilistic Methodologies on
    Networking
  • These papers were completely generated by means
    of a computer programs, with reasonable sentence
    structures, but otherwise simply a concatenation
    of computer science buzzwords, nonsensical charts
    and graphs, and nonexistent references.
  • The first was accepted as a non-reviewed
    submission the second was rejected, but without
    referee reports or other explanation.
  • In neither case did either referees or the
    Program Committee note that these papers are
    utter gibberish.

43
Abstracts of the Two Papers
  • Abstract of Paper 1
  • Many physicists would agree that, had it not
    been for congestion control, the evaluation of
    web browsers might never have occurred. In fact,
    few hackers worldwide would disagree with the
    essential unification of voice-over-IP and
    public-private key pair. In order to solve this
    riddle, we confirm that SMPs can be made
    stochastic, cacheable, and interposable.
  • Abstract of Paper 2
  • In recent years, much research has been devoted
    to the exploration of von Neumann machines
    however, few have deployed the study of simulated
    annealing. In fact, few security experts would
    disagree with the investigation of online
    algorithms 25. STEEVE, our new system for
    game-theoretic modalities, is the solution to all
    of these challenges.

44
Recent Example 1
  • In 2003 a prominent computer vendor (which is
    also involved in the HPC world) submitted results
    on the SPEC benchmark
  • Used a special command to enable memory read
    bypass, which eliminates the need to wait for
    the snoop response required in a multiprocessor
    configuration.
  • Used a special command to enable a maximum of
    eight hardware pre-fetch streams and disable
    software-based pre-fetching.
  • Installed a special high-performance,
    single-threaded malloc library, geared for speed
    rather than memory efficiency.
  • These settings are not appropriate for normal
    production usage, and thus the resulting
    performance figures are unrealistic.

45
Recent Example 2
  • Recently a certain HPC vendor claimed, in a press
    release
  • Discovery of a proof of Amdahls law.
  • New technology that is provably optimal by
    Amdahls law.
  • Several people in the HPC community responded,
    some rather sharply, to these claims. The vendor
    has responded also.
  • Lessons
  • Even if a firm or scientist has some good ideas,
    hype does not help their cause, and may endanger
    the communitys credibility.
  • Peer-reviewed publications should accompany press
    announcements.
  • Extraordinary claims require extraordinary
    evidence. Carl Sagan

46
Grid Computing Projects
GEON
47
SETI_at_Home
Seti_at_home sustains 35 Tflop/s on 2M systems 1.7
x 1021 flops over 3 years
48
Supernova Cosmology InfrastructureThanks to W.
Johnston, LBNL
49
What the Grid Does Well
  • Providing national or international access to
    important scientific datasets.
  • Providing a uniform scheme for remote system
    access and user authentication.
  • Providing a high-performance parallel platform
    for certain very loosely coupled computations.
  • Providing a high-capability platform for large
    computations that can run on a single remote
    system, chosen at run time.
  • Enabling new types of multi-disciplinary,
    multi-system, multi-dataset research.

50
What the Grid Doesnt Do So Well
  • Scientific computations that require heavy
    interprocessor communication.
  • Probably the majority of high-end scientific
    computations are of this nature.
  • This doesnt rule out such applications running
    remotely on a single system connected to the
    grid.
  • Many classified or proprietary computations.
  • Current grid security and privacy are not
    convincing for many of these users
  • This doesnt rule out internal grids -- some
    have been quite successful.

51
The Role of Good Benchmarks in Combating
Performance Abuse
  • Well-designed, rigorous, scalable performance
    benchmark tests help bring order to the field.
  • Well-thought-out and well-enforced ground rules
    are essential.
  • A rational scheme must be provided for
    calculating performance rates.
  • A well-defined test must be included to validate
    the correctness of the results.
  • A repository of results must be maintained.
  • Recent example The HPCS benchmark suite.

52
Lessons from HistoryBack to the Future
  • High standards of honesty and scientific rigor
    must be vigilantly enforced within the HPC field.
  • Rigorous peer review is essential.
  • Performance claims must be based on solid
    benchmark data and open, objective analysis of
    that data.
  • Well-constructed, community-defined benchmarks
    are essential to combat performance abuse.
  • Researchers must be willing to provide all
    details of the experimental environment, so
    others can reproduce their results.
  • A politically correct conclusion is no excuse
    for poor scholarship.
  • Hype has no place in the scientific enterprise.
  • Danger We can fool ourselves, as well as others.
Write a Comment
User Comments (0)
About PowerShow.com