id
stringlengths
5
16
query
stringlengths
1
382
pos
stringlengths
7
5.09k
neg
stringlengths
23
5.09k
qp
float64
0.4
1
qn
float64
0.34
0.91
margin
float64
0.02
0.3
1801.03195
The Hypotheses on Expansions of Iterated Stratonovich Stochastic Integrals of Arbitrary Multiplicity
In this review article we collected more than ten theorems on expansions of iterated Ito and Stratonovich stochastic integrals, which have been formulated and proved by the author. These theorems open a new direction for study of iterated Ito and Stratonovich stochastic integrals. The expansions based on multiple and repeated Fourier-Legendre series as well as on multiple and repeated trigonomectic Fourier series, converging in the mean and pointwise are presented in the article. Some of these theorems connected with iterated stochastic integrals of multiplicities 1 to 5. Also we consider two theorems on expansions of iterated Ito stochastic integrals of arbitrary multiplicity $k$, based on generalized multiple Fourier series converging in the space $L_2([t, T]^k)$ as well as two theorems on expansions of iterated Stratonovich stochastic integrals of arbitrary multiplicity $k$, based on generalized repeated Fourier series converging pointwise. On the base of the presented theorems we formulate 3 hypotheses on expansions of iterated Stratonovich stochastic integrals of arbitrary multiplicity $k$, based on generalized multiple Fourier series converging in $L_2([t, T]^k).$ These iterated Stratonovich stochastic integrals are part of the Taylor-Stratonovich expansion. Moreover, the considered expansions contain only one operation of the limit transition and substantially simpler than their analogues for iterated Ito stochastic integrals. Therefore the results of the article can be useful for solution of the problem of numerical integration of Ito stochastic differential equations.
With the use of tensor product of Hilbert space, and a diagonalization procedure from operator theory, we derive an approximation formula for a general class of stochastic integrals. Further we establish a generalized Fourier expansion for these stochastic integrals. In our extension, we circumvent some of the limitations of the more widely used stochastic integral due to Wiener and Ito, i.e., stochastic integration with respect to Brownian motion. Finally we discuss the connection between the two approaches, as well as a priori estimates and applications.
0.927155
0.841348
0.085807
1801.05856
Active Community Detection: A Maximum Likelihood Approach
We propose novel semi-supervised and active learning algorithms for the problem of community detection on networks. The algorithms are based on optimizing the likelihood function of the community assignments given a graph and an estimate of the statistical model that generated it. The optimization framework is inspired by prior work on the unsupervised community detection problem in Stochastic Block Models (SBM) using Semi-Definite Programming (SDP). In this paper we provide the next steps in the evolution of learning communities in this context which involves a constrained semi-definite programming algorithm, and a newly presented active learning algorithm. The active learner intelligently queries nodes that are expected to maximize the change in the model likelihood. Experimental results show that this active learning algorithm outperforms the random-selection semi-supervised version of the same algorithm as well as other state-of-the-art active learning algorithms. Our algorithms significantly improved performance is demonstrated on both real-world and SBM-generated networks even when the SBM has a signal to noise ratio (SNR) below the known unsupervised detectability threshold.
Critical analysis of the state of the art is a necessary task when identifying new research lines worthwhile to pursue. To such an end, all the available work related to the field of interest must be taken into account. The key point is how to organize, analyze, and make sense of the huge amount of scientific literature available today on any topic. To tackle this problem, we present here a bibliometric approach to Systematic Mapping Studies (SMS). Thus, a modify SMS protocol is used relying on the scientific references metadata to extract, process and interpret the wealth of information contained in nowadays research literature. As a test case, the procedure is applied to determine the current state and perspectives of community detection in complex networks. Our results show that community detection is a still active, far from exhausted, in development, field. In addition, we find that, by far, the most exploited methods are those related to determining hierarchical community structures. On the other hand, the results show that fuzzy clustering techniques, despite their interest, are underdeveloped as well as the adaptation of existing algorithms to parallel or, more specifically, distributed, computational systems.
0.869565
0.757111
0.112454
1801.06488
Biproducts without zero morphisms
We show how to define biproducts up to isomorphism in an arbitrary category without assuming any enrichment. This generalizes the usual definitions, and we characterize when a category has all binary biproducts in terms of an ambidextrous adjunction. Finally, we give some new examples of biproducts that our definition recognizes.
Let X be a Q-factorial Gorenstein Fano variety. Suppose that the singularities of X are canonical and that the locus where they are non-terminal has dimension zero. Let D be a prime divisor of X. We show that rho_X - rho_D < 9 (where rho is the Picard number). Moreover, if rho_X - rho_D > 3, there exists a finite morphism from X to S x Y, where S is a surface with rho_S at most 9. As an application we prove that, if X has dimension 3, then rho_X is at most 10.
0.88514
0.674988
0.210152
1801.06501
Expansion of Iterated Stochastic Integrals with Respect to Martingale Poisson Measures and with Respect to Martingales, Based on Generalized Multiple Fourier Series
In the article we consider some versions and generalizations of the approach to expansion of iterated Ito stochastic integrals of arbitrary multiplicity, based on generalized multiple Fourier series. The expansions of iterated stochastic integrals with respect to martingale Poisson measures and with respect to martingales were obtained. For the iterated stochastic integrals with respect to martingales we have proven two theorems. The first theorem is the generalization of expansion of iterated Ito stochastic integrals of arbitrary multiplicity, based on generalized multiple Fourier series. The second one is the modification of the first theorem for the case of complete orthonormal with weight $r(x)\ge 0$ systems of functions in the space $L_2([t, T])$ (in the first theorem $r(x)\equiv 1$). Mean-square convergence of the considered expansions is proven. The example of expantion of iterated (double) stochastic integrals with respect to martingales with using the system of Bessel functions is considered.
We present a construction of the basic operators of stochastic analysis (gradient and divergence) for a class of discrete-time normal martingales called obtuse random walks. The approach is based on the chaos representation property and discrete multiple stochastic integrals. We show that these operators satisfy similar identities as in the case of the Bernoulli randoms walks. We prove a Clark-Ocone-type predictable representation formula, obtain two covariance identities and derive a deviation inequality. We close the exposition by an application to option hedging in discrete time.
0.960666
0.813078
0.147587
1801.06727
A Second Order Cumulant Spectrum Based Test for Strict Stationarity
This article develops a statistical test for the null hypothesis of strict stationarity of a discrete time stochastic process. When the null hypothesis is true, the second order cumulant spectrum is zero at all the discrete Fourier frequency pairs present in the principal domain of the cumulant spectrum. The test uses a frame (window) averaged sample estimate of the second order cumulant spectrum to build a test statistic that has an asymptotic complex standard normal distribution. We derive the test statistic, study the size and power properties of the test, and demonstrate its implementation with intraday stock market return data. The test has conservative size properties and good power to detect varying variance and unit root in the presence of varying variance.
The purpose of this paper is to prove a weak convergence result for empirical processes indexed in general classes of functions and with an underlying $\alpha$-mixing sequence of random variables. In particular the uniformly boundedness assumption on the function class, which is required in most of the existing literature, is spared. Furthermore under strict stationarity a weak convergence result for the sequential empirical process indexed in function classes is obtained, as a direct consequence. Two examples in mathematical statistics, that cannot be treated with existing results, are given as possible applications.
0.851322
0.709489
0.141833
1801.07173
Abelian principalization of ray class groups
Buiding on Bosca's method, we extend to tame ray class groups the results on principalization of ideals of a number field by composition with abelian extensions of a subfield first studied by Gras. More precisely, for any extension of number fields K/k, completly split at at least one infinite place, and any squarefree divisor m of K, we prove that there exist infinitely many abelian extensions F/k such as the ray classes mod m of K principalize in KF. As a consequence we generalize to tame ray class groups the results of Kurihara on triviality of class groups for maximal abelian pro-extensions of totally real number fields.
Birman-Lubotzky-McCarthy proved that any abelian subgroup of the mapping class groups for orientable surfaces is finitely generated. We apply Birman-Lubotzky-McCarthy's arguments to the mapping class groups for non-orientable surfaces. We especially find a finitely generated group isomorphic to a given torsion-free subgroup of the mapping class groups.
0.882886
0.797895
0.084991
1801.07311
Learning Class-specific Word Representations for Early Detection of Hoaxes in Social Media
As people increasingly use social media as a source for news consumption, its unmoderated nature enables the diffusion of hoaxes, which in turn jeopardises the credibility of information gathered from social media platforms. To mitigate this problem, we study the development of a hoax detection system that can distinguish true and false reports early on. We introduce a semi-automated approach that leverages the Wikidata knowledge base to build large-scale datasets for veracity classification, which enables us to create a dataset with 4,007 reports including over 13 million tweets, 15% of which are fake. We describe a method for learning class-specific word representations using word embeddings, which we call multiw2v. Our approach achieves competitive results with F1 scores over 72% within 10 minutes of the first tweet being posted, outperforming other baselines. Our dataset represents a realistic scenario with a real distribution of true and false stories, which we release for further use as a benchmark in future research.
Social media platforms provide active communication channels during mass convergence and emergency events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the public can use this information to gain insight into the situation as it unfolds. In particular, many social media messages communicated during emergencies convey timely, actionable information. Processing social media messages to obtain such information, however, involves solving multiple challenges including: handling information overload, filtering credible information, and prioritizing different classes of messages. These challenges can be mapped to classical information processing operations such as filtering, classifying, ranking, aggregating, extracting, and summarizing. We survey the state of the art regarding computational methods to process social media messages, focusing on their application in emergency response scenarios. We examine the particularities of this setting, and then methodically examine a series of key sub-problems ranging from the detection of events to the creation of actionable and useful summaries.
0.892103
0.76647
0.125634
1801.07565
Evaluations of infinite series involving reciprocal quadratic hyperbolic functions
This paper presents a approach of summation of infinite series of hyperbolic functions. The approach is based on simple contour integral representions and residue computations with the help of some well known results of Eisenstein series given by Ramanujan and Berndt et al. Several series involving quadratic hyperbolic functions are evaluated, which can be expressed in terms of $z={}_2F_1(1/2,1/2;1;x)$ and $z'=dz/dx$. When a certain parameter in these series equal to $\pi$ the series are summable in terms of $\Gamma$ functions. Moreover, some interesting new consequences and illustrative examples are considered.
The evaluation of integral transforms of special functions is required in different research and practical areas. Analyzing the $\kappa$-$\mu$ fading distribution also khown as the generalized Rician distribution, we find out that the assessment of a few different performance metrics, such as the probability of energy detection of unknown signals and outage probability under co-channel interference, involves the evaluation of an infinite-range integral, which has the form of Laplace transform of product of Marcum Q, Bessel I, and power functions. We evaluate this integral in a closed-form and present numerical estimates.
0.895816
0.749318
0.146498
1801.10207
A-Tree: A Bounded Approximate Index Structure
Index structures are one of the most important tools that DBAs leverage in order to improve the performance of analytics and transactional workloads. However, with the explosion of data that is constantly being generated in a wide variety of domains including autonomous vehicles, Internet of Things (IoT) devices, and E-commerce sites, building several indexes can often become prohibitive and consume valuable system resources. In fact, a recent study has shown that indexes created as part of the TPC-C benchmark can account for 55% of the total memory available in a state-of-the-art in-memory DBMS. This overhead consumes valuable and expensive main memory, and limits the amount of space that a database has available to store new data or process existing data. In this paper, we present a novel approximate index structure called A-Tree. At the core of our index is a tunable error parameter that allows a DBA to balance lookup performance and space consumption. To navigate this tradeoff, we provide a cost model that helps the DBA choose an appropriate error parameter given either (1) a lookup latency requirement (e.g., 500ns) or (2) a storage budget (e.g., 100MB). Using a variety of real-world datasets, we show that our index structure is able to provide performance that is comparable to full index structures while reducing the storage footprint by orders of magnitude.
We construct a class of minimal trees and use these trees to establish a number of coloring theorems on general trees. Among the applications of these trees and coloring theorems are quantification of the Bourgain $\ell_p$ and $c_0$ indices, dualization of the Bourgain $c_0$ index, establishing sharp positive and negative results for constant reduction, and estimating the Bourgain $\ell_p$ index of an arbitrary Banach space $X$ in terms of a subspace $Y$ and the quotient $X/Y$.
0.808785
0.765281
0.043504
1802.00342
Mobility-aware, adaptive algorithms for wireless power transfer in ad hoc networks
In this work, we investigate the interesting impact of mobility on the problem of efficient wireless power transfer in ad hoc networks. We consider a set of mobile agents (consuming energy to perform certain sensing and communication tasks), and a single static charger (with finite energy) which can recharge the agents when they get in its range. In particular, we focus on the problem of efficiently computing the appropriate range of the charger with the goal of prolonging the network lifetime. We first demonstrate (under the realistic assumption of fixed energy supplies) the limitations of any fixed charging range and, therefore, the need for (and power of) a dynamic selection of the charging range, by adapting to the behavior of the mobile agents which is revealed in an online manner. We investigate the complexity of optimizing the selection of such an adaptive charging range, by showing that two simplified offline optimization problems (closely related to the online one) are NP-hard. To effectively address the involved performance trade-offs, we finally present a variety of adaptive heuristics, assuming different levels of agent information regarding their mobility and energy.
Many emerging applications in mobile adhoc networks involve group-oriented communication. Multicast is an efficient way of supporting group oriented applications, mainly in mobile environment with limited bandwidth and limited power. For using such applications in an adversarial environment as military, it is necessary to provide secure multicast communication. Key management is the fundamental challenge in designing secure multicast communications. In many multicast interactions, new member can join and current members can leave at any time and existing members must communicate securely using multicast key distribution within constrained energy for mobile adhoc networks. This has to overcome the challenging element of "1 affects n" problem which is due to high dynamicity of groups. Thus this paper shows the specific challenges towards multicast key management protocols for securing multicast key distribution in mobile ad hoc networks, and present relevant multicast key management protocols in mobile ad hoc networks. A comparison is done against some pertinent performance criteria.
0.879368
0.662188
0.21718
1802.04344
An infinite family of congruences for 1-shell totally symmetric plane partitions
Let $s(n)$ denote the number of 1-shell totally symmetric plane partitions of $n$. In this paper, we prove an infinite family of congruences modulo powers of $5$ for $s(n)$. Namely, $$s\left(2\cdot 5^{2\alpha-1}n+5^{2\alpha-1}\right)\equiv 0 \pmod{5^{\alpha}}.$$
A two-parameter family of exchangeable partitions with a simple updating rule is introduced. The partition is identified with a randomized version of a standard symmetric Dirichlet species-sampling model with finitely many types. A power-like distribution for the number of types is derived.
0.926883
0.763592
0.163291
1802.10182
Elicitation of FANO resonances and confinement well using pattern recognition over UV-Vis spectra of gold nano spheres
Here, we have employed Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) to analyze a database consisting of Mie calculated UV-Vis spectra of gold nanospheres (GNS). PCA and LDA extract the hidden structures of the database by the corresponding vectors and coordinates. 3D representation of coordinates of PCA of spectral database results in a beam of surface plasmon polaritons (SPP) following a parabolic trajectory. The eigen spectra of PCA exhibit the Fano type resonances of SPP, and quantum confinement effects are observed by 3d representation of LDA coordinates obtained from the database. In addition, standing wave patterns resulting from oscillations of ions and electrons are illustrated through the eigen spectra of LDA. Such results confirm that GNPs have high potential for high energy density physics applications. Furthermore, the coordinates of PCA of spectral database are used for the training of Machine Learning (ML) algorithms for the estimation of the diameters of GNS. As a result, experimental spectra of diameters of GNS are tested, and the outputs of ML algorithms and Dynamic Light Scattering (DLS) measurements are compared for reliability of calculations. PCA based artificial neural network (ANN) were found to estimate the diameters with a high accuracy. Moreover, our results show that application of PCA and LDA on spectra could efficiently investigate the light-nanoparticles interactions for applications like rapid size determination.
In this work, we propose to detect the iris and periocular regions simultaneously using coarse annotations and two well-known object detectors: YOLOv2 and Faster R-CNN. We believe coarse annotations can be used in recognition systems based on the iris and periocular regions, given the much smaller engineering effort required to manually annotate the training images. We manually made coarse annotations of the iris and periocular regions (122K images from the visible (VIS) spectrum and 38K images from the near-infrared (NIR) spectrum). The iris annotations in the NIR databases were generated semi-automatically by first applying an iris segmentation CNN and then performing a manual inspection. These annotations were made for 11 well-known public databases (3 NIR and 8 VIS) designed for the iris-based recognition problem and are publicly available to the research community. Experimenting our proposal on these databases, we highlight two results. First, the Faster R-CNN + Feature Pyramid Network (FPN) model reported an Intersection over Union (IoU) higher than YOLOv2 (91.86% vs 85.30%). Second, the detection of the iris and periocular regions being performed simultaneously is as accurate as performed separately, but with a lower computational cost, i.e., two tasks were carried out at the cost of one.
0.812468
0.604777
0.207691
1803.00875
Hopf bifurcation in a mean field quantum laser equation
We study the dynamics of a non-linear Gorini-Kossakowski-Sudarshan-Lindblad equation with mean-field Hamiltonian that describe a simple laser under the mean field approximation. The open quantum system is formed by a single mode optical cavity and a set of two level atoms, each coupled to a reservoir. We prove that the mean field quantum master equation has a unique regular stationary solution. In case a relevant parameter $C_\mathfrak{b} $, i.e., the cavity cooperative parameter, is less than $1$, we prove that any regular solution converges exponentially fast to the equilibrium, and so the regular stationary state is a globally asymptotically stable equilibrium solution. We obtain that a locally exponential stable family of periodic solutions is born at the regular stationary state as $C_\mathfrak{b} $ passes through the critical value $1$. Then, the mean-field laser equation has a Hopf bifurcation at $C_\mathfrak{b} =1 $ of supercritical-like type. Thus, we establish the mechanism by which the full quantum dynamics yields the bifurcation scenario at $C_\mathfrak{b} =1 $ of the Maxwell-Bloch equations describing the laser, under consideration, in the semiclassical laser theory. Moreover, applying our main results we find the long-time behavior of the von Neumann entropy, the photon-number statistics, and the quantum variance of the quadratures. We develop a new technique for proving the exponential convergence in open quantum systems based on a new variation of constant formula.
Convection in an infinite fluid layer is often modelled by considering a finite box with periodic boundary conditions in the two horizontal directions. The translational invariance of the problem implies that any solution can be translated horizontally by an arbitrary amount. Some solutions travel, but those solutions that are invariant under reflections in both horizontal directions cannot travel, since motion in any horizontal direction is balanced by an equal and opposite motion elsewhere. Equivariant bifurcation theory allows us to understand the steady and time-dependent ways in which a pattern can travel when a mirror symmetry of the pattern is broken in a bifurcation. Here we study symmetry-breaking instabilities of convection with a square planform. A pitchfork bifurcation leads to squares that travel uniformly, while a Hopf bifurcation leads to a new class of oscillations in which squares drift to and fro but with no net motion of the pattern. Two types of travelling squares are possible after a pitchfork bifurcation, and three or more oscillatory solutions are created in a Hopf bifurcation. One of the three oscillations, alternating pulsating waves, has been observed in recent numerical simulations of convection in the presence of a magnetic field. We also present a low-order model of three-dimensional compressible convection that contains these symmetry-breaking instabilities. Our analysis clarifies the relationship between several types of time-dependent patterns that have been observed in numerical simulations of convection.
0.875264
0.731083
0.144181
1803.03469
Monotone Matrix Estimation via Robust Deconvolution
The goal of deconvolution is in estimating the distribution of a random variable based on its noisy observations. The goal of matrix estimation is in estimating the entries of a large matrix from observed entries, which are noisy versions of entries in a small fraction of the entire matrix. We study the rate of convergence for estimation of matrices with a certain monotonicity property. It turns out to be equivalent to solving a robust version of the deconvolution problem. As the main result of this paper, we provide a simple, intuitive algorithm for matrix estimation which extends the works by Fan (1991) and Delaigle et al. (2008). We show that our computationally efficient method achieves near optimal minimax rate for the matrix estimation as well as robust deconvolution. This rate is within a constant factor to the rate achieved by the kernel deconvolution estimator in the classical setup.
In this work we construct an optimal shrinkage estimator for the precision matrix in high dimensions. We consider the general asymptotics when the number of variables $p\rightarrow\infty$ and the sample size $n\rightarrow\infty$ so that $p/n\rightarrow c\in (0, +\infty)$. The precision matrix is estimated directly, without inverting the corresponding estimator for the covariance matrix. The recent results from the random matrix theory allow us to find the asymptotic deterministic equivalents of the optimal shrinkage intensities and estimate them consistently. The resulting distribution-free estimator has almost surely the minimum Frobenius loss. Additionally, we prove that the Frobenius norms of the inverse and of the pseudo-inverse sample covariance matrices tend almost surely to deterministic quantities and estimate them consistently. At the end, a simulation is provided where the suggested estimator is compared with the estimators for the precision matrix proposed in the literature. The optimal shrinkage estimator shows significant improvement and robustness even for non-normally distributed data.
0.86606
0.752627
0.113433
1803.04817
Characterizations of Gelfand rings, specially clean rings and their dual rings
In this paper, new criteria for zero dimensional rings, Gelfand rings, clean rings and mp-rings are given. The equivalency of some of the classical criteria are also proved by new and simple methods. A new and interesting class of rings is introduced and studied, we call them purified rings. Specially, non-trivial characterizations for reduced purified rings are given. Purified rings are actually the dual of clean rings. The pure ideals of reduced Gelfand rings and mp-rings are characterized. It is also proved that if the topology of a scheme is Hausdorff then the affine opens of that scheme is stable under taking finite unions (and nonempty finite intersections). In particular, every compact scheme is an affine scheme.
The K-ring of symmetric vector bundles over a scheme X, the so-called Grothendieck-Witt ring of X, can be endowed with the structure of a (special) $\lambda$-ring. The associated $\gamma$-filtration generalizes the fundamental filtration on the (Grothendieck-)Witt ring of a field and is closely related to the "classical" filtration by the kernels of the first two Stiefel-Whitney classes.
0.868188
0.773594
0.094594
1803.05392
Constructing Imperfect Recall Abstractions to Solve Large Extensive-Form Games
Extensive-form games are an important model of finite sequential interaction between players. The size of the extensive-form representation is, however, often prohibitive and it is the most common cause preventing deployment of game-theoretic solution concepts to real-world scenarios. The state-of-the-art approach to solve this issue is the information abstraction methodology. The majority of existing information abstraction approaches create abstracted games where players remember all their actions and all the information they obtained in the abstracted game -- a property denoted as a perfect recall. Remembering all the actions, however, causes the number of decision points of the player (and hence also the size of his strategy) to grow exponentially with the number of actions taken in the past. On the other hand, relaxing the perfect recall requirement (resulting in so-called imperfect recall abstractions) can significantly increase the computational complexity of solving the resulting abstracted game. In this work, we introduce two domain-independent algorithms FPIRA and CFR+IRA which are able to start with an arbitrary imperfect recall abstraction of the solved two-player zero-sum perfect recall extensive-form game. The algorithms simultaneously solve the abstracted game, detect the missing information causing problems and return it to the players. This process is repeated until provable convergence to the desired approximation of the Nash equilibrium of the original game. We experimentally demonstrate that even when the algorithms start with trivial coarse imperfect recall abstraction, they are capable of approximating Nash equilibrium of large games using abstraction with as little as 0.9% of information sets of the original game.
Quantitative extensions of parity games have recently attracted significant interest. These extensions include parity games with energy and payoff conditions as well as finitary parity games and their generalization to parity games with costs. Finitary parity games enjoy a special status among these extensions, as they offer a native combination of the qualitative and quantitative aspects in infinite games: The quantitative aspect of finitary parity games is a quality measure for the qualitative aspect, as it measures the limit superior of the time it takes to answer an odd color by a larger even one. Finitary parity games have been extended to parity games with costs, where each transition is labeled with a nonnegative weight that reflects the costs incurred by taking it. We lift this restriction and consider parity games with costs with arbitrary integer weights. We show that solving such games is in NP $\cap$ coNP, the signature complexity for games of this type. We also show that the protagonist has finite-state winning strategies, and provide tight pseudo-polynomial bounds for the memory he needs to win the game. Naturally, the antagonist may need infinite memory to win. Moreover, we present tight bounds on the quality of winning strategies for the protagonist. Furthermore, we investigate the problem of determining, for a given threshold $b$, whether the protagonist has a strategy of quality at most $b$ and show this problem to be EXPTIME-complete. The protagonist inherits the necessity of exponential memory for implementing such strategies from the special case of finitary parity games.
0.905121
0.775706
0.129415
1803.0636
Geometry of probability simplex via optimal transport
We study the Riemannian structures of the probability simplex on a weighted graph introduced by $L^2$-Wasserstein metric. The main idea is to embed the probability simplex as a submanifold of the positive orthant. From this embedding, we establish the geometry formulas of the probability simplex in Euclidean coordinates. The geometry computations on discrete simplex guide us to introduce the ones in the Fr{\'e}chet manifold of densities supported on a finite dimensional base manifold. Following the steps of Nelson, Bakery-{\'E}mery, Lott-Villani-Strum and the geometry of density manifold, we demonstrate an identity that connects the Bakery-{\'E}mery $\Gamma_2$ operator (carr{\'e} du champ it{\'e}r{\'e}) and Yano's formula on the base manifold. Several examples of differential equations in probability simplex are demonstrated.
On the space of probability densities, we extend the Wasserstein geodesics to the case of higher-order interpolation such as cubic spline interpolation. After presenting the natural extension of cubic splines to the Wasserstein space, we propose a simpler approach based on the relaxation of the variational problem on the path space. We explore two different numerical approaches, one based on multi-marginal optimal transport and entropic regularization and the other based on semi-discrete optimal transport.
0.844259
0.789197
0.055062
1803.06763
Differentially Private Release and Analysis of Youth Voter Registration Data via Statistical Election to Partition Sequentially
Voter data is important in political science research and applications such as improving youth voter turnout. Privacy protection is imperative in voter data since it often contains sensitive individual information. Differential Privacy (DP) formalizes privacy in probabilistic terms and provides a robust concept for privacy protection. DIfferentially Private Data Synthesis (DIPS) techniques produce synthetic data in the DP setting. However, statistical efficiency of the synthetic data via DIPS can be low due to the potentially large amount of noise injected to satisfy DP, especially in high-dimensional data, which is often the case in voter data. We propose a new DIPS approach STatistical Election to Partition Sequentially (STEPS) that sequentially partitions data by attributes per their contribution in explaining the data variability. Additionally, we develop a metric to effectively assess the similarity of synthetic data to the actual data. The application of the STEPS procedure on the 2000-2012 Current Population Survey youth voter data suggests STEPS is easy to implement and preserves the original information better than some DIPS approaches including the Laplace mechanism on the full cross-tabulation of the data and the hierarchical histograms generated via random partitioning.
Recently, an ingenious protocol called Algorand has been proposed to overcome these limitations. Algorand uses an innovative process - called cryptographic sortition - to securely and unpredictably elect a set of voters from the network periodically. These voters are responsible for reaching consensus through a Byzantine Agreement (BA) protocol on one block per time, guaranteeing an overwhelming probability of linearity of the blockchain. In this paper, we present a security analysis of Algorand. To the best of our knowledge, it is the first security analysis as well as the first formal study on Algorand. We designed an attack scenario in which a group of malicious users tries to break the protocol, or at least limiting it to a reduced partition of network users, by exploiting a possible security flaw in the messages validation process of the BA. Since the source code or an official simulator for Algorand was not available at the time of our study, we created a simulator (which is available on request) to implement the protocol and assess the feasibility of our attack scenario. Our attack requires the attacker to have a trivial capability of establishing multiple connections with targeted nodes and costs practically nothing to the attacker. Our results show that it is possible to slow down the message validation process on honest nodes, which eventually forces them to choose default values on the consensus; leaving the targeted nodes behind in the chain as compared to the non-attacked nodes. Even though our results are subject to the real implementation assumption, the core concept of our attack remains valid.
0.912324
0.647696
0.264628
1803.07733
Bach flow on homogeneous products
Qualitative behavior of Bach flow is established on compact four-dimensional locally homogeneous product manifolds. This is achieved by lifting to the homogeneous universal cover and, in most cases, capitalizing on the resultant group structure. The resulting system of ordinary differential equations is carefully analyzed on a case-by-case basis, with explicit solutions found in some cases. Limiting behavior of the metric and the curvature are determined in all cases. The behavior on quotients of $\mathbb{R} \times \mathbb{S}^3$ proves to be the most challenging and interesting.
In this paper, periodic homogenization of a steady fluid flow in fissured porous solids with imperfect interfacial contact is performed via two-scale asymptotic method.
0.862799
0.727424
0.135375
1803.08336
Smart TWAP trading in continuous-time equilibria
This paper presents a continuous-time equilibrium model of TWAP trading and liquidity provision in a market with multiple strategic investors with heterogeneous intraday trading targets. We solve the model in closed-form and show there are infinitely many equilibria. We compare the competitive equilibrium with different non-price-taking equilibria. In addition, we show intraday TWAP benchmarking reduces market liquidity relative to just terminal trading targets alone. The model is computationally tractable, and we provide a number of numerical illustrations. An extension to stochastic VWAP targets is also provided.
Time and Sales of corn futures traded electronically on the CME Group Globex are studied. Theories of continuous prices turn upside down reality of intra-day trading. Prices and their increments are discrete and obey lattice probability distributions. A function for systematic evolution of futures trading volume is proposed. Dependence between sample skewness and kurtosis of waiting times does not support hypothesis of Weibull distribution. Kumaraswamy distribution is more suitable for waiting times. Relationships between trading volume and maximum profit strategies are presented. Frequencies of absolute b-increments are approximated by a Hurwitz Zeta distribution. Relative b-increments are non-Gaussian too. Dependence between b- and a-increments allows to interpret the sample variances of b-increments as a stochastic process. Mean sample variance of b-increments vs. a-increments is presented. The L1 distance and Log-likelihood statistics for independence between a- and b-increments are controversial. Corn price jumps remind of chain branching reactions. Bi-logarithmic plots of the empirical frequencies of extreme b-increments vs. ranks are presented. Corresponding distributions resemble snakes forked tongues. The maximum profit strategy is discussed as a measure of non-equilibrium.
0.883204
0.762594
0.12061
1804.00049
Assessing inter-modal and inter-regional dependencies in prodromal Alzheimer's disease using multimodal MRI/PET and Gaussian graphical models
A sequence of pathological changes takes place in Alzheimer's disease, which can be assessed in vivo using various brain imaging methods. Currently, there is no appropriate statistical model available that can easily integrate multiple imaging modalities, being able to utilize the additional information provided from the combined data. We applied Gaussian graphical models (GGMs) for analyzing the conditional dependency networks of multimodal neuroimaging data and assessed alterations of the network structure in mild cognitive impairment (MCI) and Alzheimer's dementia (AD) compared to cognitively healthy controls. Data from N=667 subjects were obtained from the Alzheimer's Disease Neuroimaging Initiative. Mean amyloid load (AV45-PET), glucose metabolism (FDG-PET), and gray matter volume (MRI) was calculated for each brain region. Separate GGMs were estimated using a Bayesian framework for the combined multimodal data for each diagnostic category. Graph-theoretical statistics were calculated to determine network alterations associated with disease severity. Network measures clustering coefficient, path length and small-world coefficient were significantly altered across diagnostic groups, with a biphasic u-shape trajectory, i.e. increased small-world coefficient in early MCI, intermediate values in late MCI, and decreased values in AD patients compared to controls. In contrast, no group differences were found for clustering coefficient and small-world coefficient when estimating conditional dependency networks on single imaging modalities. GGMs provide a useful methodology to analyze the conditional dependency networks of multimodal neuroimaging data.
The evaluation of white matter lesion progression is an important biomarker in the follow-up of MS patients and plays a crucial role when deciding the course of treatment. Current automated lesion segmentation algorithms are susceptible to variability in image characteristics related to MRI scanner or protocol differences. We propose a model that improves the consistency of MS lesion segmentations in inter-scanner studies. First, we train a CNN base model to approximate the performance of icobrain, an FDA-approved clinically available lesion segmentation software. A discriminator model is then trained to predict if two lesion segmentations are based on scans acquired using the same scanner type or not, achieving a 78% accuracy in this task. Finally, the base model and the discriminator are trained adversarially on multi-scanner longitudinal data to improve the inter-scanner consistency of the base model. The performance of the models is evaluated on an unseen dataset containing manual delineations. The inter-scanner variability is evaluated on test-retest data, where the adversarial network produces improved results over the base model and the FDA-approved solution.
0.892239
0.751341
0.140898
1804.021
Restless Bandits in Action: Resource Allocation, Competition and Reservation
We study a resource allocation problem with varying requests, and with resources of limited capacity shared by multiple requests. It is modeled as a set of heterogeneous Restless Multi-Armed Bandit Problems (RMABPs) connected by constraints imposed by resource capacity. Following Whittle's relaxation idea and Weber and Weiss' asymptotic optimality proof, we propose a simple policy and prove it to be asymptotically optimal in a regime where both arrival rates and capacities increase. We provide a simple sufficient condition for asymptotic optimality of the policy, and in complete generality propose a method that generates a set of candidate policies for which asymptotic optimality can be checked. The effectiveness of these results is demonstrated by numerical experiments. To the best of our knowledge, this is the first work providing asymptotic optimality results for such a resource allocation problem and such a combination of multiple RMABPs.
We consider a finite-armed structured bandit problem in which mean rewards of different arms are functions of a common hidden parameter $\theta^*$. This problem setting subsumes several previously studied frameworks that assume linear or invertible reward functions. Our approach exploits the structure in the problem gradually and pulls only some of the sub-optimal arms O(log T) times, while other sub-optimal arms, termed as non-competitive, are pulled only O(1) times. Put differently, the set of non-competitive arms, which depend on the hidden parameter $\theta^*$, are stopped being pulled after some finite time. We show how this approach can be transformed into a general algorithm that can be coupled with any classic bandit strategy (UCB, Thompson Sampling, KL-UCB etc.), allowing them to be used in the structured bandit setting with substantial reductions in regret. In particular, we get bounded regret in several cases of practical interest where all sub-optimal arms are non-competitive. We also demonstrate the superiority of our algorithms over existing methods (including UCB-S) via experiments on the Movielens dataset.
0.876785
0.80442
0.072365
1804.02421
Geometry underlies the mechanical stiffening and softening of thin sheets
A basic paradigm underlying the Hookean mechanics of amorphous, isotropic solids is that small deformations are proportional to the magnitude of external forces. However, slender bodies may undergo large deformations even under minute forces, leading to nonlinear responses rooted in purely geometric effects. Here we identify stiffening and softening as two prominent motifs of such a material-independent, geometrically-nonlinear response of thin sheets, and we show how both effects emanate from nontrivial yet generic features of the stress and displacement fields. Our insights are borne out of studying the indentation of a polymer film on a liquid bath, using experiments, simulations, and theory. We find that stiffening is due to growing anisotropy of the stress field whereas softening is due to changes in shape. We discuss similarities with the mechanics of fiber networks, suggesting that our results are relevant to a wide range of two- and three-dimensional materials.
Fibrous networks are ideal functional materials since they provide mechanical rigidity at low weight. Such structures are omnipresent in natural biomaterials from cells to tissues, as well as in man-made materials from polymeric composites to paper and textiles. Here, we demonstrate that fibrous networks of the blood clotting protein fibrin undergo a strong and irreversible increase in their mechanical rigidity in response to compression. This rigidification can be precisely predetermined from the level of applied compressive strain, providing a means to program the network rigidity without having to change its composition. To identify the mechanism underlying this programmable rigidification, we measure single fiber-fiber interactions using optical tweezers. We further develop a minimal computational model of adhesive fiber networks that shows that load-induced bond formation can explain the adaptation of the fibrin networks to compressive loading. The model predicts that the network stiffness after compressive programming obeys a universal power-law dependence on the prestress built in by new bond formation, which we confirm experimentally. The generality of this functional stiffening mechanism together with our ability to quantitatively predict it provides a new powerful approach to program the stiffness of fibrous materials and dynamically adapt them to different loading conditions.
0.882769
0.739887
0.142883
1804.02744
Unsupervised Learning of Mixture Models with a Uniform Background Component
Gaussian Mixture Models are one of the most studied and mature models in unsupervised learning. However, outliers are often present in the data and could influence the cluster estimation. In this paper, we study a new model that assumes that data comes from a mixture of a number of Gaussians as well as a uniform "background" component assumed to contain outliers and other non-interesting observations. We develop a novel method based on robust loss minimization that performs well in clustering such GMM with a uniform background. We give theoretical guarantees for our clustering algorithm to obtain best clustering results with high probability. Besides, we show that the result of our algorithm does not depend on initialization or local optima, and the parameter tuning is an easy task. By numeric simulations, we demonstrate that our algorithm enjoys high accuracy and achieves the best clustering results given a large enough sample size. Finally, experimental comparisons with typical clustering methods on real datasets witness the potential of our algorithm in real applications.
Independent Component Analysis (ICA) is a technique for unsupervised exploration of multi-channel data that is widely used in observational sciences. In its classic form, ICA relies on modeling the data as linear mixtures of non-Gaussian independent sources. The maximization of the corresponding likelihood is a challenging problem if it has to be completed quickly and accurately on large sets of real data. We introduce the Preconditioned ICA for Real Data (Picard) algorithm, which is a relative L-BFGS algorithm preconditioned with sparse Hessian approximations. Extensive numerical comparisons to several algorithms of the same class demonstrate the superior performance of the proposed technique, especially on real data, for which the ICA model does not necessarily hold.
0.816451
0.74477
0.071681
1804.08178
Towards Practical Constrained Monotone Submodular Maximization
We design new algorithms for maximizing a monotone non-negative submodular function under various constraints, which improve the state-of-the-art in time complexity and/or performance guarantee. We first investigate the cardinality constrained submodular maximization problem that has been widely studied for about four decades. We design an $(1-\frac{1}{e}-\varepsilon)$-approximation algorithm that makes $O(n\cdot \max \{\varepsilon^{-1},\log\log k \})$ queries. To the best of our knowledge, this is the fastest known algorithm. We further answer the open problem on finding a lower bound on the number of queries. We show that, no (randomized) algorithm can achieve a ratio better than $(\frac{1}{2}+\Theta(1))$ with $o(\frac{n}{\log n})$ queries. The acceleration above is achieved by our \emph{Adaptive Decreasing Threshold} (ADT) algorithm. Based on ADT, we study the $p$-system and $d$ knapsack constrained maximization problem. We show that an $(1/(p+\frac{7}{4}d+1)-\varepsilon)$-approximate solution can be computed via $O(\frac{n}{\varepsilon}\log \frac{n}{\varepsilon}\max\{\log \frac{1}{\varepsilon},\log\log n\})$ queries. Note that it improves the state of the art in both time complexity and approximation ratio. We also show how to improve the ratio for a single knapsack constraint via $O(n\cdot \max \{\varepsilon^{-1},\log\log k \})$ queries. For maximizing a submodular function with curvature $\kappa$ under matroid constraint, we show an $(1-\frac{\kappa}{e}-\varepsilon)$-approximate algorithm that uses $\tilde{O}(nk)$ value oracle queries. Our ADT could be utilized to obtain faster algorithms in other problems. To prove our results, we introduce a general characterization between randomized complexity and deterministic complexity of approximation algorithms that could be used in other problems and may be interesting in its own right.
Social media has brought a revolution on how people are consuming news. Beyond the undoubtedly large number of advantages brought by social-media platforms, a point of criticism has been the creation of echo chambers and filter bubbles, caused by social homophily and algorithmic personalization. In this paper we address the problem of balancing the information exposure in a social network. We assume that two opposing campaigns (or viewpoints) are present in the network, and that network nodes have different preferences towards these campaigns. Our goal is to find two sets of nodes to employ in the respective campaigns, so that the overall information exposure for the two campaigns is balanced. We formally define the problem, characterize its hardness, develop approximation algorithms, and present experimental evaluation results. Our model is inspired by the literature on influence maximization, but we offer significant novelties. First, balance of information exposure is modeled by a symmetric difference function, which is neither monotone nor submodular, and thus, not amenable to existing approaches. Second, while previous papers consider a setting with selfish agents and provide bounds on best response strategies (i.e., move of the last player), we consider a setting with a centralized agent and provide bounds for a global objective function.
0.855066
0.689329
0.165737
1804.11135
A Non-parametric Multi-stage Learning Framework for Cognitive Spectrum Access in IoT Networks
Given the increasing number of devices that is going to get connected to wireless networks with the advent of Internet of Things, spectrum scarcity will present a major challenge. Application of opportunistic spectrum access mechanisms to IoT networks will become increasingly important to solve this. In this paper, we present a cognitive radio network architecture which uses multi-stage online learning techniques for spectrum assignment to devices, with the aim of improving the throughput and energy efficiency of the IoT devices. In the first stage, we use an AI technique to learn the quality of a user-channel pairing. The next stage utilizes a non-parametric Bayesian learning algorithm to estimate the Primary User OFF time in each channel. The third stage augments the Bayesian learner with implicit exploration to accelerate the learning procedure. The proposed method leads to significant improvement in throughput and energy efficiency of the IoT devices while keeping the interference to the primary users minimal. We provide comprehensive empirical validation of the method with other learning based approaches.
Next-generation wireless networks (NGWN) have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of machine learning by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning, respectively. Furthermore, we investigate their employment in the compelling applications of NGWNs, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various machine learning algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.
0.893151
0.76411
0.129041
1805.00224
Multi-Objective Path Planning of an Autonomous Mobile Robot in Static and Dynamic Environments using a Hybrid PSO-MFB Optimisation Algorithm
The main aim of this paper is to solve a path planning problem for an autonomous mobile robot in static and dynamic environments by determining the collision-free path that satisfies the chosen criteria for shortest distance and path smoothness. The algorithm mimics the real world by adding the actual size of the mobile robot to that of the obstacles and formulating the problem as a moving point in the free-space. The proposed path planning algorithm consists of three modules: in the first module, the path planning algorithm forms an optimised path by conducting a hybridized Particle Swarm Optimization-Modified Frequency Bat (PSO-MFB) algorithm that minimises distance and follows path smoothness criteria; in the second module, any infeasible points generated by the proposed PSO-MFB Algorithm are detected by a novel Local Search (LS) algorithm and integrated with the PSO-MFB algorithm to be converted into feasible solutions; the third module features obstacle detection and avoidance (ODA), which is triggered when the mobile robot detects obstacles within its sensing region, allowing it to avoid collision with obstacles. Simulations have been carried out that indicated that this method generates a feasible path even in complex dynamic environments and thus overcomes the shortcomings of conventional approaches such as grid methods. Comparisons with previous examples in the literature are also included in the results.
Autonomous drones (also known as unmanned aerial vehicles) are increasingly popular for diverse applications of light-weight delivery and as substitutions of manned operations in remote locations. The computing systems for drones are becoming a new venue for research in cyber-physical systems. Autonomous drones require integrated intelligent decision systems to control and manage their flight missions in the absence of human operators. One of the most crucial aspects of drone mission control and management is related to the optimization of battery lifetime. Typical drones are powered by on-board batteries, with limited capacity. But drones are expected to carry out long missions. Thus, a fully automated management system that can optimize the operations of battery-operated autonomous drones to extend their operation time is highly desirable. This paper presents several contributions to automated management systems for battery-operated drones: (1) We conduct empirical studies to model the battery performance of drones, considering various flight scenarios. (2) We study a joint problem of flight mission planning and recharging optimization for drones with an objective to complete a tour mission for a set of sites of interest in the shortest time. This problem captures diverse applications of delivery and remote operations by drones. (3) We present algorithms for solving the problem of flight mission planning and recharging optimization. We implemented our algorithms in a drone management system, which supports real-time flight path tracking and re-computation in dynamic environments. We evaluated the results of our algorithms using data from empirical studies. (4) To allow fully autonomous recharging of drones, we also develop a robotic charging system prototype that can recharge drones autonomously by our drone management system.
0.906328
0.711701
0.194627
1805.02115
A geometric approach to study p-summability in multilinear mappings
We prove that the equivalences between the local definition, the Pietsch's Domination theorem and the Pietsch's factorization theorem of absolutely $p$-summing linear operators between Banach spaces, admit a generalization to multilinear and homogenoeus polynomial mappings. This gives rise, in a natural way, to a notion of p-summability which is the one we study.
The main purpose of this paper is to introduce the concepts of Wijsman $C_{\lambda}$ statistical convergence, Wijsman $C_{\lambda}$ summability and Wijsman $\mathcal{I}$-$C_{\lambda}$ summability for sequence of sets by using submethod. Also, we establish some relations among the Wijsman $C_{\lambda}$ summability, Wijsman $D_{\lambda}$ summability and Wijsman $C_{1}$ summability. Finally, we have given some equivalence results for these concepts.
0.843005
0.760602
0.082402
1805.02319
Single-Anchor Two-Way Localization Bounds for 5G mmWave Systems: Two Protocols
Recently, mmWave 5G localization has been shown to be a promising technology to achieve centimetre-level accuracy. This generates more opportunities for location-aware communication applications. One assumption usually made in the investigation of localization methods is that the user equipment (UE) and the base station (BS) are synchronized. However, in reality, communications systems are not finely synchronized to a level useful for localization. Therefore, in this paper, we investigate two-way localization protocols that avoid the prerequisite of tight time synchronization. Namely, we consider a distributed localization protocol (DLP), whereby the BS and UE exchange signals in two rounds of transmission and then localization is achieved using the signal received in the second round. On the other hand, we also consider a centralized localization protocol (CLP), whereby localization is achieved using the signals received in the two rounds. We derive the position (PEB) and orientation error bounds (OEB) applying beamforming at both ends and compare them to the traditional one-way localization. Our results obtained using realistic system parameters show that mmWave localization is mainly limited by angular rather than temporal estimation and that CLP significantly outperforms DLP. Our simulations also show that it is more beneficial to have more antennas at the BS than at the UE.
We consider the secret key capacity of the thermal loss channel, which is modeled by a beam splitter mixing an input signal mode with an environmental thermal mode. This capacity is the maximum value of secret bits that two remote parties can generate by means of the most general adaptive protocols assisted by unlimited and two-way classical communication. To date, only upper and lower bounds are known. The present work improves the lower bound by resorting to Gaussian protocols based on suitable trusted-noise detectors.
0.906333
0.710904
0.195429
1805.02546
Programmable projective measurement with linear optics
We present a scheme for a universal device which can be programmed by quantum states to perform a chosen projective measurement, and its implementation in linear optics. In particular, our scheme takes a single input system (the input register), and M-1 systems all in a state psi (the program registers), whose role is to encode the measurement direction, and approximates the projective measurement with respect to the state psi on the input system. Importantly the scheme is entirely independent of the measurement basis choice psi. This is done optimally in M, if we demand the input state psi always returns the appropriate outcome, and limits to the ideal projective measurement with M. The size of the linear optical circuit we propose scales as M log M , and requires O(M log M) classical side processing. Our scheme can be viewed as an extension of the swap test to the instance where one state is supplied many times.
Time-bin encoding is a robust form of optical quantum information, especially for transmission in optical fibers. To read out the information, the separation of the time bins must be larger than the detector time resolution, typically on the order of nanoseconds for photon counters. In the present work, we demonstrate a technique using a nonlinear interaction between chirped entangled time-bin photons and shaped laser pulses to perform projective measurements on arbitrary time-bin states with picosecond-scale separations. We demonstrate a tomographically-complete set of time-bin qubit projective measurements and show the fidelity of operations is sufficiently high to violate the CHSH-Bell inequality by more than 6 standard deviations.
0.817687
0.702288
0.115399
1805.02726
Sobolev-type inequalities on Cartan-Hadamard manifolds under curvature bounds
We investigate the validity, as well as the failure, of Sobolev-type inequalities on Cartan-Hadamard manifolds under suitable bounds on the sectional and the Ricci curvatures. More specifically, we prove that if the sectional curvatures are bounded from above by a negative power of the distance from a fixed pole (times a negative constant), then all the $ L^p $ inequalities that interpolate between Poincar\'e and Sobolev hold in the radial setting provided such power lies in the interval $ (-2,0) $, except the Poincar\'e inequality. The latter was established in a famous paper by H.P. McKean, under a constant negative bound from above on the sectional curvatures. If the power is equal to $ -2 $ then $ p $ must necessarily be strictly larger (in a quantitative way) than $ 2 $. Upon assuming similar bounds from below on the Ricci curvature, we show that the nonradial version of such inequalities fails, except for the Sobolev one. Finally, we discuss applications of the here-established Sobolev-type inequalities to optimal smoothing effects for radial porous medium equations.
We prove some isoperimetric type inequalities in warped product manifolds, or more generally, multiply warped product manifolds. We then relate them to inequalities involving the higher order mean-curvature integrals. We also apply our results to obtain sharp eigenvalue estimates and some sharp geometric inequalities in space forms.
0.924874
0.861231
0.063643
1805.03514
Terahertz quantum cryptography
A well-known empirical rule for the demand of wireless communication systems is that of Edholm's law of bandwidth. It states that the demand for bandwidth in wireless short-range communications doubles every 18 months. With the growing demand for bandwidth and the decreasing cell size of wireless systems, terahertz (THz) communication systems are expected to become increasingly important in modern day applications. With this expectation comes the need for protecting users' privacy and security in the best way possible. With that in mind, we show that quantum key distribution can operate in the THz regime and we derive the relevant secret key rates against realistic collective attacks. In the extended THz range (from 0.1 to 50 THz), we find that below 1 THz, the main detrimental factor is thermal noise, while at higher frequencies it is atmospheric absorption. Our results show that high-rate THz quantum cryptography is possible over distances varying from a few meters using direct reconciliation, to about 220m via reverse reconciliation. We also give a specific example of the physical hardware and architecture that could be used to realize our THz quantum key distribution scheme.
The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cryptography libraries specifically aimed for application in the field of Internet of Things. The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various cryptography libraries and the comparative analysis of their features in IoT.
0.885207
0.670622
0.214585
1805.03778
Threshold functions for patterns in random subsets of finite vector spaces
We study the existence of certain "patterns" in random subsets of vector spaces over finite fields. The patterns we consider are three-term arithmetic progressions, right triangles, parallelograms and affine planes. We give a threshold function for the property that a random subset of vectors contains a pattern from a given family, and show that the number of patterns contained in the random subset is asymptotically Poisson at the threshold scale.
We give a full classification of vertex-transitive zonotopes. We prove that a vertex-transitive zonotope is a $\Gamma$-permutahedron for some finite reflection group $\Gamma\subset\mathrm{O}(\mathbb R^d)$. The same holds true for zonotopes in which all vertices are on a common sphere, and all edges are of the same length (which we call homogeneous zonotopes). The classification of these then follows from the classification of finite reflection groups. We proof that root systems can be characterized as those centrally symmetric sets of vectors, for which all intersections with half-spaces, that contain exactly half the vectors, are congruent. We provide a further sufficient condition for a centrally symmetric set being a root system.
0.898293
0.652022
0.246271
1805.04687
BDD100K: A Diverse Driving Video Database with Scalable Annotation Tooling
Datasets drive vision progress and autonomous driving is a critical vision application, yet existing driving datasets are impoverished in terms of visual content. Driving imagery is becoming plentiful, but annotation is slow and expensive, as annotation tools have not kept pace with the flood of data. Our first contribution is the design and implementation of a scalable annotation system that can provide a comprehensive set of image labels for large-scale driving datasets. Our second contribution is a new driving dataset, facilitated by our tooling, which is an order of magnitude larger than previous efforts, and is comprised of over 100K videos with diverse kinds of annotations including image level tagging, object bounding boxes, drivable areas, lane markings, and full-frame instance segmentation. The dataset possesses geographic, environmental, and weather diversity, which is useful for training models so that they are less likely to be surprised by new conditions. The dataset can be requested at http://bdd-data.berkeley.edu.
Video summarization has been extensively studied in the past decades. However, user-generated video summarization is much less explored since there lack large-scale video datasets within which human-generated video summaries are unambiguously defined and annotated. Toward this end, we propose a user-generated video summarization dataset - UGSum52 - that consists of 52 videos (207 minutes). In constructing the dataset, because of the subjectivity of user-generated video summarization, we manually annotate 25 summaries for each video, which are in total 1300 summaries. To the best of our knowledge, it is currently the largest dataset for user-generated video summarization. Based on this dataset, we present FrameRank, an unsupervised video summarization method that employs a frame-to-frame level affinity graph to identify coherent and informative frames to summarize a video. We use the Kullback-Leibler(KL)-divergence-based graph to rank temporal segments according to the amount of semantic information contained in their frames. We illustrate the effectiveness of our method by applying it to three datasets SumMe, TVSum and UGSum52 and show it achieves state-of-the-art results.
0.807651
0.764656
0.042995
1805.05021
A One-Class Decision Tree Based on Kernel Density Estimation
One-class Classification (OCC) is an area of machine learning which addresses prediction based on unbalanced datasets. Basically, OCC algorithms achieve training by means of a single class sample, with potentially some additional counter-examples. The current OCC models give satisfaction in terms of performance, but there is an increasing need for the development of interpretable models. In the present work, we propose a one-class model which addresses concerns of both performance and interpretability. Our hybrid OCC method relies on density estimation as part of a tree-based learning algorithm, called One-Class decision Tree (OC-Tree). Within a greedy and recursive approach, our proposal rests on kernel density estimation to split a data subset on the basis of one or several intervals of interest. Thus, the OC-Tree encloses data within hyper-rectangles of interest which can be described by a set of rules. Against state-of-the-art methods such as Cluster Support Vector Data Description (ClusterSVDD), One-Class Support Vector Machine (OCSVM) and isolation Forest (iForest), the OC-Tree performs favorably on a range of benchmark datasets. Furthermore, we propose a real medical application for which the OC-Tree has demonstrated its effectiveness, through the ability to tackle interpretable diagnosis aid based on unbalanced datasets.
Multivariate density estimation is a popular technique in statistics with wide applications including regression models allowing for heteroskedasticity in conditional variances. The estimation problems become more challenging when observations are missing in one or more variables of the multivariate vector. A flexible class of mixture of tensor products of kernel densities is proposed which allows for easy implementation of imputation methods using Gibbs sampling and shown to have superior performance compared to some of the exisiting imputation methods currently available in literature. Numerical illustrations are provided using several simulated data scenarios and applications to couple of case studies are also presented.
0.834974
0.718475
0.116499
1805.06084
A Hierarchical Max-infinitely Divisible Process for Extreme Areal Precipitation Over Watersheds
Understanding the spatial extent of extreme precipitation is necessary for determining flood risk and adequately designing infrastructure (e.g., stormwater pipes) to withstand such hazards. While environmental phenomena typically exhibit weakening spatial dependence at increasingly extreme levels, limiting max-stable process models for block maxima have a rigid dependence structure that does not capture this type of behavior. We propose a flexible Bayesian model from a broader family of (conditionally) max-infinitely divisible processes that allows for weakening spatial dependence at increasingly extreme levels, and due to a hierarchical representation of the likelihood in terms of random effects, our inference approach scales to large datasets. The proposed model is constructed using flexible random basis functions that are estimated from the data, allowing for straightforward inspection of the predominant spatial patterns of extremes. In addition, the described process possesses (conditional) max-stability as a special case, making inference on the tail dependence class possible. We apply our model to extreme precipitation in eastern North America, and show that the proposed model adequately captures the extremal behavior of the data.
Statistical modeling of multivariate and spatial extreme events has attracted broad attention in various areas of science. Max-stable distributions and processes are the natural class of models for this purpose, and many parametric families have been developed and successfully applied. Due to complicated likelihoods, the efficient statistical inference is still an active area of research, and usually composite likelihood methods based on bivariate densities only are used. Thibaud et al. (2016, Ann. Appl. Stat., to appear) use a Bayesian approach to fit a Brown--Resnick process to extreme temperatures. In this paper, we extend this idea to a methodology that is applicable to general max-stable distributions and that uses full likelihoods. We further provide simple conditions for the asymptotic normality of the median of the posterior distribution and verify them for the commonly used models in multivariate and spatial extreme value statistics. A simulation study shows that this point estimator is considerably more efficient than the composite likelihood estimator in a frequentist framework. From a Bayesian perspective, our approach opens the way for new techniques such as Bayesian model comparison in multivariate and spatial extremes.
0.842095
0.767159
0.074937
1805.06431
ChoiceNet: Robust Learning by Revealing Output Correlations
In this paper, we focus on the supervised learning problem with corrupted training data. We assume that the training dataset is generated from a mixture of a target distribution and other unknown distributions. We estimate the quality of each data by revealing the correlation between the generated distribution and the target distribution. To this end, we present a novel framework referred to here as ChoiceNet that can robustly infer the target distribution in the presence of inconsistent data. We demonstrate that the proposed framework is applicable to both classification and regression tasks. ChoiceNet is evaluated in comprehensive experiments, where we show that it constantly outperforms existing baseline methods in the handling of noisy data. Particularly, ChoiceNet is successfully applied to autonomous driving tasks where it learns a safe driving policy from a dataset with mixed qualities. In the classification task, we apply the proposed method to the MNIST and CIFAR-10 datasets and it shows superior performances in terms of robustness to noisy labels.
Understanding cell function requires an accurate description of how noise is transmitted through biochemical networks. We present an analytical result for the power spectrum of the output signal of a biochemical network that takes into account the correlations between the noise in the input signal (the extrinsic noise) and the noise in the reactions that constitute the network (the intrinsic noise). These correlations arise from the fact that the reactions by which biochemical signals are detected necessarily affect the signaling molecules and the detection components of the network simultaneously. We show that anti-correlation between the extrinsic and intrinsic noise enhances the robustness of zero-order ultrasensitive networks to biochemical noise. We discuss the consequences of the correlation between extrinsic and intrinsic noise for a modular description of noise transmission through large biochemical networks in the context of the mitogen-activated protein kinase cascade.
0.843911
0.660425
0.183487
1805.0838
Wasserstein natural gradient in statistical manifolds with continuous sample space
We study the Wasserstein natural gradient in parametric statistical models with continuous sample spaces. Our approach is to pull back the $L^2$-Wasserstein metric tensor in the probability density space to a parameter space, equipping the latter with a positive definite metric tensor, under which it becomes a Riemannian manifold, named the Wasserstein statistical manifold. In general, it is not a totally geodesic sub-manifold of the density space, and therefore its geodesics will differ from the Wasserstein geodesics, except for the well-known Gaussian distribution case, a fact which can also be validated under our framework. We use the sub-manifold geometry to derive a gradient flow and natural gradient descent method in the parameter space. When parametrized densities lie in $\bR$, the induced metric tensor establishes an explicit formula. In optimization problems, we observe that the natural gradient descent outperforms the standard gradient descent when the Wasserstein distance is the objective function. In such a case, we prove that the resulting algorithm behaves similarly to the Newton method in the asymptotic regime. The proof calculates the exact Hessian formula for the Wasserstein distance, which further motivates another preconditioner for the optimization process. To the end, we present examples to illustrate the effectiveness of the natural gradient in several parametric statistical models, including the Gaussian measure, Gaussian mixture, Gamma distribution, and Laplace distribution.
This work presents a reformulation of the recently proposed Wasserstein autoencoder framework on a non-Euclidean manifold, the Poincar\'e ball model of the hyperbolic space. By assuming the latent space to be hyperbolic, we can use its intrinsic hierarchy to impose structure on the learned latent space representations. We demonstrate the model in the visual domain to analyze some of its properties and show competitive results on a graph link prediction task.
0.915652
0.818589
0.097063
1805.08755
Peer-to-Peer Energy-Aware Tree Network Formation
We study the fundamental problem of distributed energy-aware network formation with mobile agents of limited computational power that have the capability to wirelessly transmit and receive energy in a peer-to-peer manner. Specifically, we design simple distributed protocols consisting of a small number of states and interaction rules for the construction of both arbitrary and binary trees. Further, we theoretically and experimentally evaluate a plethora of energy redistribution protocols that exploit different levels of knowledge in order to achieve desired energy distributions which require, for instance, that every agent has twice the energy of the agents of higher depth (according to the tree network). Our study shows that without using any knowledge about the network structure, such energy distributions cannot be achieved in a timely manner, which means that there might be high energy loss during the redistribution process. On the other hand, only a few extra bits of information seem to be enough to guarantee quick convergence to energy distributions that satisfy particular properties, yielding low energy loss.
We collected mobility traces of 84,208 avatars spanning 22 regions over two months in Second Life, a popular networked virtual environment. We analyzed the traces to characterize the dynamics of the avatars mobility and behavior, both temporally and spatially. We discuss the implications of the our findings to the design of peer-to-peer networked virtual environments, interest management, mobility modeling of avatars, server load balancing and zone partitioning, client-side caching, and prefetching.
0.865376
0.681388
0.183988
1805.09411
A Generalized Active Learning Approach for Unsupervised Anomaly Detection
This work formalizes the new framework for anomaly detection, called active anomaly detection. This framework has, in practice, the same cost of unsupervised anomaly detection but with the possibility of much better results. We show that unsupervised anomaly detection is an undecidable problem and that a prior needs to be assumed for the anomalies probability distribution in order to have performance guarantees. Finally, we also present a new layer that can be attached to any deep learning model designed for unsupervised anomaly detection to transform it into an active anomaly detection method, presenting results on both synthetic and real anomaly detection datasets.
A major goal of unsupervised learning is to discover data representations that are useful for subsequent tasks, without access to supervised labels during training. Typically, this involves minimizing a surrogate objective, such as the negative log likelihood of a generative model, with the hope that representations useful for subsequent tasks will arise as a side effect. In this work, we propose instead to directly target later desired tasks by meta-learning an unsupervised learning rule which leads to representations useful for those tasks. Specifically, we target semi-supervised classification performance, and we meta-learn an algorithm -- an unsupervised weight update rule -- that produces representations useful for this task. Additionally, we constrain our unsupervised update rule to a be a biologically-motivated, neuron-local function, which enables it to generalize to different neural network architectures, datasets, and data modalities. We show that the meta-learned update rule produces useful features and sometimes outperforms existing unsupervised learning techniques. We further show that the meta-learned unsupervised update rule generalizes to train networks with different widths, depths, and nonlinearities. It also generalizes to train on data with randomly permuted input dimensions and even generalizes from image datasets to a text task.
0.908505
0.675301
0.233203
1805.09646
An extension of valid syllogisms to valid categorical arguments
One presents the Set Theory Model (STM) of the valid categorical arguments (VCAs). The STM was initially developed by George Boole and Lewis Carroll, who worked with a universe of discourse, U, which contains the pairwise complementary sets, or categorical terms,S,non-S,P,non-P,M,non-M, and is thus partitioned into eight subsets. In STM both the positive terms, S,P,M, and the negative terms, non-S, non-P, non-M, are allowed to appear in the pairs of categorical premises (PCPs) and their entailed logical consequences (LCs). One thus counts 64 distinct PCPs, out of which only 32 PCPs generate VCAs, and 32 PCPs do not entail any LC. By comparison, Classic Categorical Syllogistic (CCS) admits PCPs worded only via the positive terms S,P,M, and accepts as LCs of the valid syllogisms (VS) only the statements E(S,P), I(S,P), A(S,P), or O(S,P). It is easier to see on the VCA set, than on its VS proper subset, that there are only three distinct types of VCAs, (and of VS), and that all the VCAs of the same type are equivalent. Besides the VCAs and their LCs, one discusses VCA sorites, VCA distribution conservation, empty set constraints (ESC), and VCA generalized versions of the Rules of Valid Syllogisms (RofVS).
We discuss a general method of constructing the products of composite operators using the exact renormalization group formalism. Considering mainly the Wilson action at a generic fixed point of the renormalization group, we give an argument for the validity of short distance expansions of operator products. We show how to compute the expansion coefficients by solving differential equations, and test our method with some simple examples.
0.839665
0.583329
0.256336
1805.12042
New Progress in Univariate Polynomial Root-finding
Univariate polynomial root-finding has been studied for four millennia and is still the subject of intensive research. Hundreds of efficient algorithms for this task have been proposed. Two of them are nearly optimal. The first one was proposed in 1995; it relies on recursive factorization of a polynomial, is quite involved, and has never been implemented. The second one was proposed in 2016, relies on subdivision iterations, was implemented in 2018, and promises to be practically competitive, although user's current choice for univariate polynomial root-finding is the package MPSolve, proposed in 2000, revised in 2014, and based on Ehrlich's functional iterations. By incorporating some old and new techniques we significantly accelerate subdivision and Ehrlich's iterations; as by-product we also accelerate path-following Newton's iterations for root-finding.. Moreover our acceleration of the known subdivision root-finders is dramatic in the case of sparse input polynomials. Some of our techniques promise to be valuable for the design and analysis of other polynomial root-finders as well.
We collect here elementary properties of differentiation matrices for univariate polynomials expressed in various bases, including orthogonal polynomial bases and non-degree-graded bases such as Bernstein bases and Lagrange \& Hermite interpolational bases.
0.912231
0.79543
0.116801
1805.12491
Structure from noise: Mental errors yield abstract representations of events
Humans are adept at uncovering abstract associations in the world around them, yet the underlying mechanisms remain poorly understood. Intuitively, learning the higher-order structure of statistical relationships should involve complex mental processes. Here we propose an alternative perspective: that higher-order associations instead arise from natural errors in learning and memory. Combining ideas from information theory and reinforcement learning, we derive a maximum entropy (or minimum complexity) model of people's internal representations of the transitions between stimuli. Importantly, our model (i) affords a concise analytic form, (ii) qualitatively explains the effects of transition network structure on human expectations, and (iii) quantitatively predicts human reaction times in probabilistic sequential motor tasks. Together, these results suggest that mental errors influence our abstract representations of the world in significant and predictable ways, with direct implications for the study and design of optimally learnable information sources.
We introduce the bilingual dual-coding theory as a model for bilingual mental representation. Based on this model, lexical selection neural networks are implemented for a connectionist transfer project in machine translation. This lexical selection approach has two advantages. First, it is learnable. Little human effort on knowledge engineering is required. Secondly, it is psycholinguistically well-founded.
0.842746
0.702202
0.140544
1806.00033
Minimal pseudo-Anosov stretch factors on nonorientable surfaces
We determine the smallest pseudo-Anosov stretch factor (restricting to pseudo-Anosov maps with an orientable invariant foliation) on the closed nonorientable surfaces of genus 4, 5, 6, 7, 8, 10, 12, 14, 16, 18 and 20. We also determine the smallest stretch factor of an orientation-reversing pseudo-Anosov map (again restricting to orientable invariant foliations) on the closed orientable surfaces of genus 1, 3, 5, 7, 9 and 11.
A 2-cell embedding of a graph $G$ into a closed (orientable or nonorientable) surface is called regular if its automorphism group acts regularly on the flags - mutually incident vertex-edge-face triples. In this paper, we classify the regular embeddings of complete bipartite graphs $K_{n,n}$ into nonorientable surfaces. Such regular embedding of $K_{n,n}$ exists only when $n = 2p_1^{a_1}p_2^{a_2}... p_k^{a_k}$ (a prime decomposition of $n$) and all $p_i \equiv \pm 1 (\mod 8)$. In this case, the number of those regular embeddings of $K_{n,n}$ up to isomorphism is $2^k$.
0.87385
0.662245
0.211606
1806.00696
NLP-assisted software testing: a systematic review
To reduce manual effort of extracting test cases from natural-language requirements, many approaches based on Natural Language Processing (NLP) have been proposed in the literature. Given the large amount of approaches in this area, and since many practitioners are eager to utilize such techniques, it is important to synthesize and provide an overview of the state-of-the-art in this area. Our objective is to summarize the state-of-the-art in NLP-assisted software testing which could benefit practitioners to potentially utilize those NLP-based techniques. Moreover, this can benefit researchers in providing an overview of the research landscape. To address the above need, we conducted a survey in the form of a systematic literature mapping (classification) and systematic literature review (SLR). After compiling an initial pool of 95 papers, we conducted a systematic voting, and our final pool included 67 technical papers. This review paper provides an overview of the contribution types presented in the papers, types of NLP approaches used to assist software testing, types of required input requirements, and a review of tool support in this area. Some key results we have detected are: (1) only four of the 38 tools (11%) presented in the papers are available for download; (2) a larger ratio of the papers (30 of 67) provided a shallow exposure to the NLP aspects (almost no details). Conclusion: This paper would benefit both practitioners and researchers by serving as an "index" to the body of knowledge in this area. The results could help practitioners utilizing the existing NLP-based techniques; this, in turn, reduces the cost of test-case design and decreases the amount of human resources spent on test activities. After sharing this review with some of our industrial collaborators, initial insights show that this review can indeed be useful and beneficial to practitioners.
Twitter social network contains a large amount of information generated by its users. That information is composed of opinions and comments that may reflect trends in social behavior. There is talk of trend when it is possible to identify opinions and comments geared towards the same shared by a lot of people direction. To determine if two or more written opinions share the same address, techniques Natural Language Processing (NLP) are used. This paper proposes a methodology for predicting reflected in Twitter from the use of sentiment analysis functions NLP based on social behaviors. The case study was selected the 2015 Presidential in Argentina, and a software architecture Big Data composed Vertica data base with the component called Pulse was used. Through the analysis it was possible to detect trends in voting intentions with regard to the presidential candidates, achieving greater accuracy in predicting that achieved with traditional systems surveys.
0.92266
0.654133
0.268527
1806.00972
New geometric and field theoretic aspects of a radiation dominated universe II. Fundamental Cosmological Observers (FCOs)
We further extend our work [S. K. Modak, Phys. Rev. D97 (2018) no.10, 105016] to give more insights on the radiation dominated stage of the early universe within the context of the quantum field theory in curved spacetime. Specifically, we focus on the fundamental cosmological observers (FCOs) who have a special status in the new spacetime metric introduced in [S. K. Modak, Phys. Rev. D97 (2018) no.10, 105016]. These observers are the only observers who are accelerating radially and do not see an event horizon due to a coordinate singularity. Closer analysis, using the new coordinates, leads us to the definition of a new vacuum state and a compulsory gravitational particle creation for the fundamental cosmological observers. We further calculate the renormalized energy momentum tensors, both in FCO's and comoving observer's frame, and discuss their importance. Finally, we make a side by side comparison of this particle creation phenomena with the well known Unruh effect.
The main aim of this paper is to provide a qualitative introduction to the cosmic inflation and its relationship with current cosmological observations. The inflationary model solves many of the fundamental problems that challenge the Standard Big Bang cosmology i.e. Flatness, Horizon and Monopole problem, and additionally provides an explanation for the initial conditions observed throughout the Large-Scale Structure of the Universe, such as galaxies. In this review we describe the general solutions carry out by a single scalar field. Then with the use of current surveys, we show the constraints imposed on the inflationary parameters $(n_{\rm s},r)$ which allow us to make the connection between theoretical and observational cosmology. In this way, with the latest results, it is possible to choose or at least to constrain the right inflationary model, parameterised by a single scalar field potential $V(\phi)$.
0.869901
0.739913
0.129987
1806.01029
Component response rate variation underlies the stability of complex systems
The stability of a complex system generally decreases with increasing system size and interconnectivity, a counterintuitive result of widespread importance across the physical, life, and social sciences. Despite recent interest in the relationship between system properties and stability, the effect of variation in the response rate of individual system components remains unconsidered. Here I vary the component response rates ($\boldsymbol{\gamma}$) of randomly generated complex systems. I show that when component response rates vary, the potential for system stability is markedly increased. Variation in $\boldsymbol{\gamma}$ is especially important for stability in highly complex systems, in which the probability of stability would otherwise be negligible. At such extremes of simulated system complexity, the largest stable complex systems would be unstable if not for $\boldsymbol{Var(\gamma)}$. My results therefore reveal a previously unconsidered aspect of system stability that is likely to be pervasive across all realistic complex systems.
It is demonstrated through Monte Carlo simulations that the one component lattice Coulomb gas model in two dimensions under certain conditions display features of an anomalous dynamic response. We suggest that pinning, which can either be due to the underlying discrete lattice or induced by disorder, is an essential ingredient behind this anomalous behavior. The results are discussed in relation to other situations where this response type appears, in particular the two components neutral Coulomb gas below the Kosterlitz-Thouless transition, as well as in relation to other findings from theory, simulations, and experiments on superconductors.
0.9227
0.67337
0.24933
1806.01993
Semiparametric Classification of Forest Graphical Models
We propose a new semiparametric approach to binary classification that exploits the modeling flexibility of sparse graphical models. Specifically, we assume that each class can be represented by a forest-structured graphical model. Under this assumption, the optimal classifier is linear in the log of the one- and two-dimensional marginal densities. Our proposed procedure non-parametrically estimates the univariate and bivariate marginal densities, maps each sample to the logarithm of these estimated densities and constructs a linear SVM in the transformed space. We prove convergence of the resulting classifier to an oracle SVM classifier and give finite sample bounds on its excess risk. Experiments with simulated and real data indicate that the resulting classifier is competitive with several popular methods across a range of applications.
We propose a general index model for survival data, which generalizes many commonly used semiparametric survival models and belongs to the framework of dimension reduction. Using a combination of geometric approach in semiparametrics and martingale treatment in survival data analysis, we devise estimation procedures that are feasible and do not require covariate-independent censoring as assumed in many dimension reduction methods for censored survival data. We establish the root-$n$ consistency and asymptotic normality of the proposed estimators and derive the most efficient estimator in this class for the general index model. Numerical experiments are carried out to demonstrate the empirical performance of the proposed estimators and an application to an AIDS data further illustrates the usefulness of the work.
0.842189
0.67311
0.169079
1806.02976
Artificial neural networks for Cu surface diffusion studies
Kinetic Monte Carlo (KMC) is a powerful method for simulation of diffusion processes in various systems. The accuracy of the method, however, relies on extent of details used for the parameterization of the model. Migration barriers are often used to describe diffusion on atomic scale, but the full set of these barriers may become easily unmanageable in materials with increased chemical complexity or a large number of defects. In this work, we apply a machine learning approach for Cu surface diffusion. We train an artificial neural network on a subset of the large set of $2^{26}$ barriers needed to describe correctly the surface diffusion in Cu. Our KMC simulations using the obtained barrier predictor shows sufficient accuracy in modelling {100} and {111} surfaces. The {110} surface could be modelled by overriding a limited set of barriers given by the network.
Monte Carlo (MC) simulations are essential computational approaches with widespread use throughout all areas of science. We present a method for accelerating lattice MC simulations using fully connected and convolutional artificial neural networks that are trained to perform local and global moves in configuration space, respectively. Both networks take local spacetime MC configurations as input features and can, therefore, be trained using samples generated by conventional MC runs on smaller lattices before being utilized for simulations on larger systems. This new approach is benchmarked for the case of determinant quantum Monte Carlo (DQMC) studies of the two-dimensional Holstein model. We find that both artificial neural networks are capable of learning an unspecified effective model that accurately reproduces the MC configuration weights of the original Hamiltonian and achieve an order of magnitude speedup over the conventional DQMC algorithm. Our approach is broadly applicable to many classical and quantum lattice MC algorithms.
0.888272
0.73582
0.152451
1806.03048
'Running' with tight constraints in pionless EFT
We present the 'running' contact couplings of pionless EFT in uncoupled channels, namely, $^1S_0$ and $P$ channels, truncated at the order $\mathcal{O}(Q^4)$ through exploiting the tight constraints imposed by the closed-form $T$-matrices. Some unexpected relations are found and exploited in the pursuit of nonperturbative 'running' solutions of contact couplings. The utility of such 'running' behaviors inherent in the closed-form $T$-matrices of pionless EFT is remarked and a number of important issues related to EFT constructed with various truncations are interpreted or discussed from the underlying theory perspective.
The effective field theory (EFT) of dark energy relies on three functions of time to describe the background dynamics. The viability of these functions is investigated here by means of a thorough dynamical analysis. While the system is underdetermined, and one can always find a set of functions reproducing any expansion history, we are able to determine general compatibility conditions for these functions by requiring a viable background cosmology. In particular, we identify a set of variables that allows us to transform the non-autonomous system of equations into an infinite-dimensional one characterized by a significant recursive structure. We then analyze several autonomous sub-systems, obtained truncating the original one at increasingly higher dimension, that correspond to increasingly general models of dark energy and modified gravity. Furthermore, we exploit the recursive nature of the system to draw some general conclusions on the different cosmologies that can be recovered within the EFT formalism and the corresponding compatibility requirements for the EFT functions. The machinery that we set up serves different purposes. It offers a general scheme for performing dynamical analysis of dark energy and modified gravity models within the model independent framework of EFT; the general results, obtained with this technique, can be projected into specific models, as we show in one example. It also can be used to determine appropriate ansatze for the three EFT background functions when studying the dynamics of cosmological perturbations in the context of large scale structure tests of gravity.
0.820229
0.671267
0.148962
1806.03995
The topological trees with extremal Matula numbers
Let $T$ be a rooted tree with branches $T_1,T_2,\ldots,T_r$ and $p_m$ the $m$-th prime number ($p_1=2,p_2=3,p_3=5,\ldots$). The Matula number $M(T)$ of $T$ is $p_{M(T_1)}\cdot p_{M(T_2)}\cdot \ldots \cdot p_{M(T_r)}$, starting with $M(\bullet)=1$. It was put forward half a century ago by the American mathematician David Matula. In this paper, we prove that the star (consisting of a root and leaves attached to it) and the binary caterpillar (a binary tree whose internal vertices form a path starting at the root) have the smallest and greatest Matula number, respectively, over all topological trees (rooted trees without vertices of outdegree $1$) with a prescribed number of leaves -- the extremal values are also derived.
We consider certain groups of tree automorphisms as so-called diffeological groups. The notion of diffeology, due to Souriau, allows to endow non-manifold topological spaces, such as regular trees that we look at, with a kind of a differentiable structure that in many ways is close to that of a smooth manifold; a suitable notion of a diffeological group follows. We first study the question of what kind of a diffeological structure is the most natural to put on a regular tree in a way that the underlying topology be the standard one of the tree. We then proceed to consider the group of all automorphisms of the tree as a diffeological space, with respect to the functional diffeology, showing that this diffeology is actually the discrete one, the fact that therefore is true for its subgroups as well.
0.839614
0.774569
0.065044
1806.04348
Schur Function Expansions and the Rational Shuffle Conjecture
Gorsky and Negut introduced operators $Q_{m,n}$ on symmetric functions and conjectured that, in the case where $m$ and $n$ are relatively prime, the expansion of $Q_{m,n}(-1)^n$ in terms of the fundamental quasi-symmetric functions are given by polynomials introduced by Hikita. Later, Bergeron, Garsia, Leven and Xin extended and refined the conjectures of Gorsky and Negut to give a combinatorial interpretation of the coefficients that arise in the expansion of $Q_{m,n}(-1)^n$ in terms of the fundamental quasi-symmetric functions for arbitrary $m$ and $n$ which we will call the Rational Shuffle Conjecture. In the special case $Q_{n+1,n}(-1)^{n}$, the Rational Shuffle Conjecture becomes the Shuffle Conjecture of Haglund, Haiman, Loehr, Remmel, and Ulyanov. The Shuffle Conjecture was proved in 2015 by Carlsson and Mellit and full Rational Shuffle Conjecture was later proved by Mellit. The main goal of this paper is to study the combinatorics of the coefficients that arise in the Schur function expansion of $Q_{m,n}(-1)^n$ in certain special cases. Leven gave a combinatorial proof of the Schur function expansion of $Q_{2,2n+1}(-1)^{2n+1}$ and $Q_{2n+1,2}(-1)^2$. In this paper, we explore several symmetries in the combinatorics of the coefficients that arise in the Schur function expansion of $Q_{m,n}(-1)^n$. Especially, we study the hook-shaped Schur function coefficients, and the Schur function expansion of $Q_{m,n}(-1)^n$ in the case where $m$ or $n$ equals $3$.
This paper contains the results of my PhD-thesis. I will show the K- and L-theoretic Farrell-Jones conjecture (FJC) for the general linear groups over the rationals and over the rational functions over a finite field. This especially implies the conjecture for all S-arithmetic groups.
0.887417
0.748254
0.139163
1806.05346
How many zeroes? Counting the number of solutions of systems of polynomials via geometry at infinity (Preliminary Draft)
In this book we describe an approach through toric geometry to the following problem: "estimate the number (counted with appropriate multiplicity) of isolated solutions of n polynomial equations in n variables over an algebraically closed field k." The outcome of this approach is the number of solutions for "generic" systems in terms of their "Newton polytopes," and an explicit characterization of what makes a system "generic." The pioneering work in this field was done in the 1970s by Kushnirenko, Bernstein and Khovanskii, who completely solved the problem of counting solutions of generic systems on the "torus" (k\0)^n. In the context of our problem, however, the natural domain of solutions is not the torus, but the affine space k^n. There were a number of works on extension of Bernstein's theorem to the case of affine space, and recently it has been completely resolved, the final steps having been carried out by the author. The aim of this book is to present these results in a coherent way. We start from the beginning, namely Bernstein's beautiful theorem which expresses the number of solutions of generic systems in terms of the mixed volume of their Newton polytopes. We give complete proofs, over arbitrary algebraically closed fields, of Bernstein's theorem and its recent extension to the affine space, and describe some open problems. We also apply the developed techniques to derive and generalize Kushnirenko's results on Milnor numbers of hypersurface singularities which in 1970s served as a precursor to the development of toric geometry. Care was taken to make this book as elementary as possible. In particular, we develop all the necessary algebraic geometry (modulo some explicitly stated basic results).
Plagne recently determined the asymptotic behavior of the function E(h), which counts the maximum possible number of essential elements in an additive basis for N of order h. Here we extend his investigations by studying asymptotic behavior of the function E(h,k), which counts the maximum possible number of essential subsets of size k, in a basis of order h. For a fixed k and with h going to infinity, we show that E(h,k) = \Theta_{k} ([h^{k}/\log h]^{1/(k+1)}). The determination of a more precise asymptotic formula is shown to depend on the solution of the well-known "postage stamp problem" in finite cyclic groups. On the other hand, with h fixed and k going to infinity, we show that E(h,k) \sim (h-1) {\log k \over \log \log k}.
0.822202
0.785453
0.036749
1806.05523
Bounds and algorithms for $k$-truss
A $k$-truss is a relaxation of a $k$-clique developed by Cohen (2005), specifically a connected graph where every edge is incident to at least $k$ triangles. This has proved to be a useful tool in identifying cohesive subnetworks in a variety of real-world graphs. Despite its simplicity and its utility, the combinatorial and algorithmic aspects of trusses have not been thoroughly explored. We provide nearly-tight bounds on the edge counts of $k$-trusses. We also give two improved algorithms for finding trusses in large-scale graphs. First, we present a simplified and faster algorithm, based on approach discussed in Wang & Cheng (2012). Second, we present a theoretical algorithm based on fast matrix multiplication; this extends an algorithm of Bjorklund et al. (2014) for generating triangles from a static graph to a dynamic data-structure.
We consider two multi-armed bandit problems with $n$ arms: (i) given an $\epsilon > 0$, identify an arm with mean that is within $\epsilon$ of the largest mean and (ii) given a threshold $\mu_0$ and integer $k$, identify $k$ arms with means larger than $\mu_0$. Existing lower bounds and algorithms for the PAC framework suggest that both of these problems require $\Omega(n)$ samples. However, we argue that these definitions not only conflict with how these algorithms are used in practice, but also that these results disagree with intuition that says (i) requires only $\Theta(\frac{n}{m})$ samples where $m = |\{ i : \mu_i > \max_{i \in [n]} \mu_i - \epsilon\}|$ and (ii) requires $\Theta(\frac{n}{m}k)$ samples where $m = |\{ i : \mu_i > \mu_0 \}|$. We provide definitions that formalize these intuitions, obtain lower bounds that match the above sample complexities, and develop explicit, practical algorithms that achieve nearly matching upper bounds.
0.860335
0.673728
0.186607
1806.06917
Implementation of Peridynamics utilizing HPX -- the C++ standard library for parallelism and concurrency
Peridynamics is a non-local generalization of continuum mechanics tailored to address discontinuous displacement fields arising in fracture mechanics. As many non-local approaches, peridynamics requires considerable computing resources to solve practical problems. Several implementations of peridynamics utilizing CUDA, OpenCL, and MPI were developed to address this important issue. On modern supercomputers, asynchronous many task systems are emerging to address the new architecture of computational nodes. This paper presents a peridynamics EMU nodal discretization implementation with the C++ Standard Library for Concurrency and Parallelism (HPX), an open source asynchronous many task run time system. The code is designed for modular expandability, so as to simplify it to extend with new material models or discretizations. The code is convergent for implicit time integration and recovers theoretical solutions. Explicit time integration, convergence results are presented to showcase the agreement of results with theoretical claims in previous works. Two benchmark tests on code scalability are applied demonstrating agreement between this code's scalability and theoretical estimations.
We describe a new C++ library for multiprecision arithmetic for numbers in the order of 100--500 bits, i.e., representable with just a few limbs. The library is written in "optimizing-compiler-friendly" C++, with an emphasis on the use of fixed-size arrays and particular function-argument-passing styles (including the avoidance of naked pointers) to allow the limbs to be allocated on the stack or even in registers. Depending on the particular functionality, we get close to, or significantly beat the performance of existing libraries for multiprecision arithmetic that employ hand-optimized assembly code. Most functions in the library are constant-time, which is a necessity for secure implementations of cryptographic protocols. Beyond the favorable runtime performance, our library is, to the best of the author's knowledge, the first library that offers big-integer computations during compile-time. For example, when implementing finite-field arithmetic with a fixed modulus, this feature enables the automatic precomputation (at compile time) of the special modulus-dependent constants required for Barrett and Montgomery reduction. Another application is to parse (at compile-time) a base-10-encoded big-integer literal.
0.849605
0.760393
0.089212
1806.07048
Bayesian Sequential Inference in Dynamic Survival Models
Dynamic hazard models are applied to analyze time-varying effects of covariates on the survival time. The state-of-the-art methods for learning parameters in the Bayesian framework are MCMC methods but due to high correlations among the time-varying effect parameters, they converge very slowly. To handle these correlations efficiently, we apply a Sequential Monte Carlo (SMC) method commonly known as Particle Filter (PF). We develop a proposal distribution tailored to the nature of the survival data based on the second order Taylor series expansion of the posterior distribution and the linear Bayes theory. Our PF based sampler is shown to be faster and generates an effective sample size that is more than two orders of magnitude larger than a state-of-the-art MCMC sampler for the same computing time.
We present an improved Bayesian framework for performing inference of affine transformations of constrained functions. We focus on quadrature with nonnegative functions, a common task in Bayesian inference. We consider constraints on the range of the function of interest, such as nonnegativity or boundedness. Although our framework is general, we derive explicit approximation schemes for these constraints, and argue for the use of a log transformation for functions with high dynamic range such as likelihood surfaces. We propose a novel method for optimizing hyperparameters in this framework: we optimize the marginal likelihood in the original space, as opposed to in the transformed space. The result is a model that better explains the actual data. Experiments on synthetic and real-world data demonstrate our framework achieves superior estimates using less wall-clock time than existing Bayesian quadrature procedures.
0.855289
0.780179
0.075109
1806.08301
The Online Saddle Point Problem: Applications to Online Convex Optimization with Knapsacks
We study the online saddle point problem, an online learning problem where at each iteration a pair of actions need to be chosen without knowledge of the current and future (convex-concave) payoff functions. The objective is to minimize the gap between the cumulative payoffs and the saddle point value of the aggregate payoff function, which we measure using a metric called "SP-regret". The problem generalizes the online convex optimization framework and can be interpreted as finding the Nash equilibrium for the aggregate of a sequence of two-player zero-sum games. We propose an algorithm that achieves $\tilde{O}(\sqrt{T})$ SP-regret in the general case, and $O(\log T)$ SP-regret for the strongly convex-concave case. We then consider an online convex optimization with knapsacks problem motivated by a wide variety of applications such as: dynamic pricing, auctions, and crowdsourcing. We relate this problem to the online saddle point problem and establish $O(\sqrt{T})$ regret using a primal-dual algorithm.
We consider the stochastic optimization problem where a convex function is minimized observing recursively the gradients. We introduce SAEW, a new procedure that accelerates exponential weights procedures with the slow rate $1/\sqrt{T}$ to procedures achieving the fast rate $1/T$. Under the strong convexity of the risk, we achieve the optimal rate of convergence for approximating sparse parameters in $\mathbb{R}^d$. The acceleration is achieved by using successive averaging steps in an online fashion. The procedure also produces sparse estimators thanks to additional hard threshold steps.
0.886029
0.790873
0.095156
1806.09011
Starflows with singularities of different indices
A vector field X is called a star flow if every periodic orbit of any vector field C1-close to X is hypebolic. It is known that a generic star flow in dimensions 3 and 4 are such that the chain recurrence classes are either hyperboilc or singular hyperbolic ([MPP] and [GSW]) We present a nonempty open set of star flows on a 5 dimensional manifold for which two singular points of different indices belong (robusly) to the same chain recurrence class. This prevents the class to be singular hyperbolic. We show that this chain recurrence class is robustly chain transitive. The firts and only example of this phenomena is in [BCGP]. We proove that this example has a weak form of hyperbolicity called strong multisingular hyperbolicity. This is a particular case of the multisingular hyperbolicity presented in [BdL] and this implies that the example is a star flow.
For a class of solutions of the fundamental difference equation of isotropic loop quantum cosmology, the difference equation can be replaced by a differential equation valid for {\em all} values of the triad variable. The differential equation admits a `unique' non-singular continuation through vanishing triad. A WKB approximation for the solutions leads to an effective continuum Hamiltonian. The effective dynamics is also non-singular (no big bang singularity) and approximates the classical dynamics for large volumes. The effective evolution is thus a more reliable model for further phenomenological implications of the small volume effects.
0.823337
0.661413
0.161923
1806.10229
A Simulational Model for Witnessing Quantum Effects of Gravity Using IBM Quantum Computer
Witnessing quantum effects in the gravitational field is found to be exceptionally difficult in practice due to lack of empirical evidence. Hence, a debate is going on among physicists whether gravity has a quantum domain or not. There had been no successful experiments at all to show the quantum nature of gravity till two recent independent works by Bose et al. [Phys. Rev. Lett. 119, 240401 (2017)] and by Marletto and Vedral [Phy. Rev. Lett. 119, 240402 (2017)]. The authors have proposed schemes to test the quantumness of gravity in two small test masses by entangling two spatially separated objects using gravitational interactions. They provide a method to witness the entanglement using spin correlation measurements, which could imply evidence for gravity being a quantum coherent mediator. Here we propose a simulational model by providing a new quantum circuit for verifying the above schemes. We simulate the schemes for the first time in IBM's 5-qubit quantum chip 'ibmqx4' by developing a quantum system which shows effects analogous to quantum gravity and calculates the degree of entanglement of the spin correlation. The entanglement witness over a range is obtained for different experimental parameters.
We discuss an efficient physical realization of topological quantum walks on a finite lattice. The $N$-point lattice is realized with $\log_2 N$ qubits, and the quantum circuit utilizes a number of quantum gates which is polynomial in the number of qubits. In a certain scaling limit, we show that a large number of steps is implemented with a number of quantum gates which is independent of the number of steps. We ran the quantum algorithm on the IBM-Q five-qubit quantum computer, thus experimentally demonstrating topological features, such as boundary bound states, on a lattice with $N=4$ points.
0.8632
0.695603
0.167597
1806.10749
On Optimality of Adaptive Linear-Quadratic Regulators
Performance of adaptive control policies is assessed through the regret with respect to the optimal regulator, which reflects the increase in the operating cost due to uncertainty about the dynamics parameters. However, available results in the literature do not provide a quantitative characterization of the effect of the unknown parameters on the regret. Further, there are problems regarding the efficient implementation of some of the existing adaptive policies. Finally, results regarding the accuracy with which the system's parameters are identified are scarce and rather incomplete. This study aims to comprehensively address these three issues. First, by introducing a novel decomposition of adaptive policies, we establish a sharp expression for the regret of an arbitrary policy in terms of the deviations from the optimal regulator. Second, we show that adaptive policies based on a slight modification of the widely used Certainty Equivalence scheme are efficient. Specifically, we establish a regret of (nearly) square-root rate for two families of randomized adaptive policies. The presented regret bounds are obtained by using anti-concentration results on the random matrices employed for randomizing the estimates of the unknown parameters. Moreover, we study the minimal additional information needed on dynamics matrices for which the regret will become of logarithmic order. Finally, the rate at which the unknown parameters of the system are being identified is specified.
Let $k$ be a number field and $\tilde k$ a fixed quadratic extension of $k$. In this paper and its companion, we find the mean value of the product of class numbers and regulators of two quadratic extensions $F,F^*\not=\tilde k$ contained in the biquadratic extensions of $k$ containing $\tilde k$.
0.784252
0.663832
0.12042
1807.01361
Connecting Velocity and Entanglement in Quantum Walks
We investigate the relation between transport properties and entanglement between the internal (spin) and external (position) degrees of freedom in one-dimensional discrete time quantum walks. We obtain closed-form expressions for the long-time position variance and asymptotic entanglement of quantum walks whose time evolution is given by any balanced quantum coin, starting from any initial qubit and position states following a delta-like (local) and Gaussian distributions. We find out that the knowledge of the limit velocity of the walker together with the polar angle of the initial qubit provide the asymptotic entanglement for local states, while this velocity with the quantum coin phases give it for highly delocalized states.
We establish a quantitative connection between the amount of lost classical information about a quantum state and the concomitant loss of entanglement. Using methods that have been developed for the optimal purification of mixed states we find a class of mixed states with known distillable entanglement. These results can be used to determine the quantum capacity of a quantum channel which randomizes the order of transmitted signals.
0.897261
0.784609
0.112652
1807.02173
A Comprehensive Survey on Addressing Methods in the Internet of Things
Over the last ten years, both research in and the real world application of Internet of Things (IoT) have grown exponentially. The aim of IoT devices is to connect all things around us to the Internet and thus provide us with smarter cities, intelligent homes and generally more comfortable lives. Supporting these devices have led to several new challenges which must be addressed. One of the critical challenges facing interacting with IoT devices is addressing billions of devices (things) around the world, including: computers, tablets, smart phones, wearable devices, sensors and embedded computers, etc. This paper comprehensively surveys addressing methods for IoT devices including their advantages and disadvantages thereof. Metrics are proposed and used for evaluating these methods.
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from device security and network optimization, to fine-grained user profiling). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: (i) the goal of the analysis; (ii) the point where the network traffic is captured; and (iii) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi Access Points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.
0.838356
0.659594
0.178762