text
stringlengths 137
2.43k
| field
stringclasses 2
values | label
int64 0
1
|
---|---|---|
Title: Properties from Mechanisms: An Equivariance Perspective on Identifiable Representation Learning
Abstract: A key goal of unsupervised representation learning is "inverting" a data generating process to recover its latent properties. Existing work that provably achieves this goal relies on strong assumptions on relationships between the latent variables (e.g., independence conditional on auxiliary information). In this paper, we take a very different perspective on the problem and ask, "Can we instead identify latent properties by leveraging knowledge of the mechanisms that govern their evolution?" We provide a complete characterization of the sources of non-identifiability as we vary knowledge about a set of possible mechanisms. In particular, we prove that if we know the exact mechanisms under which the latent properties evolve, then identification can be achieved up to any equivariances that are shared by the underlying mechanisms. We generalize this characterization to settings where we only know some hypothesis class over possible mechanisms, as well as settings where the mechanisms are stochastic. We demonstrate the power of this mechanism-based perspective by showing that we can leverage our results to generalize existing identifiable representation learning results. These results suggest that by exploiting inductive biases on mechanisms, it is possible to design a range of new identifiable representation learning approaches. | cs | 1 |
Title: A Robust Quantile Huber Loss With Interpretable Parameter Adjustment In Distributional Reinforcement Learning
Abstract: Distributional Reinforcement Learning (RL) estimates return distribution mainly by learning quantile values via minimizing the quantile Huber loss function, entailing a threshold parameter often selected heuristically or via hyperparameter search, which may not generalize well and can be suboptimal. This paper introduces a generalized quantile Huber loss function derived from Wasserstein distance (WD) calculation between Gaussian distributions, capturing noise in predicted (current) and target (Bellman-updated) quantile values. Compared to the classical quantile Huber loss, this innovative loss function enhances robustness against outliers. Notably, the classical Huber loss function can be seen as an approximation of our proposed loss, enabling parameter adjustment by approximating the amount of noise in the data during the learning process. Empirical tests on Atari games, a common application in distributional RL, and a recent hedging strategy using distributional RL, validate the effectiveness of our proposed loss function and its potential for parameter adjustments in distributional RL. | cs | 0 |
Title: Theta-Induced Diffusion on Tate Elliptic Curves over Non-Archimedean Local Fields
Abstract: A diffusion operator on the $K$-rational points of a Tate elliptic curve $E_q$ is constructed, where $K$ is a non-archimedean local field, as well as an operator on the Berkovich-analytification $E_q^{an}$ of $E_q$. These are integral operators for measures coming from a regular $1$-form, and kernel functions constructed via theta functions. The second operator can be described via certain non-archimedan curvature forms on $E_q^{an}$. The spectra of these self-adjoint bounded operators on the Hilbert spaces of $L^2$-functions are identical and found to consist of finitely many eigenvalues. A study of the corresponding heat equations yields a positive answer to the Cauchy problem, and induced Markov processes on the curve. Finally, some geometric information about the $K$-rational points of $E_q$ is retrieved from the spectrum. | math | 0 |
Title: A Galton-Watson tree approach to local limits of permutations avoiding a pattern of length three
Abstract: We use local limits of Galton-Watson trees to establish local limit theorems for permutations conditioned to avoid a pattern of length three. In the case of 321-avoiding permutations our results resolve an open problem of Pinsky. In the other cases our results give new descriptions of the limiting objects in terms of size-biased Galton-Watson trees. | math | 0 |
Title: An Equivariant Tensor Product on Mackey Functors
Abstract: For all subgroups $H$ of a cyclic $p$-group $G$ we define norm functors that build a $G$-Mackey functor from an $H$-Mackey functor. We give an explicit construction of these functors in terms of generators and relations based solely on the intrinsic, algebraic properties of Mackey functors and Tambara functors. We use these norm functors to define a monoidal structure on the category of Mackey functors where Tambara functors are the commutative ring objects. | math | 1 |
Title: Causal Stream Inclusions
Abstract: We study solutions to systems of stream inclusions 'f in T(f)', where T is assumed to be causal in the sense that elements in output streams are determined by a finite history of inputs. For solving these inclusions we develop a correspondence of causality and contraction with respect to the prefix distance on streams. Now, based on this causality-contraction correspondence, we apply fixpoint principles for the spherically complete ultrametric space of streams to obtain solutions for causal stream inclusions. The underlying fixpoint iterations induce fixpoint induction principles for reasoning about solutions of causal stream inclusions. In addition, these fixpoint approximations induce anytime algorithms for computing finite stream prefixes of solutions. We illustrate the use of these developments for some central concepts of system design. | cs | 0 |
Title: Crafting, Communality, and Computing: Building on Existing Strengths To Support a Vulnerable Population
Abstract: In Nepal, sex-trafficking survivors and the organizations that support them have limited resources to assist the survivors in their on-going journey towards reintegration. We take an asset-based approach wherein we identify and build on the strengths possessed by such groups. In this work, we present reflections from introducing a voice-annotated web application to a group of survivors. The web application tapped into and built upon two elements of pre-existing strengths possessed by the survivors -- the social bond between them and knowledge of crafting as taught to them by the organization. Our findings provide insight into the array of factors influencing how the survivors act in relation to one another as they created novel use practices and adapted the technology. Experience with the application seemed to open knowledge of computing as a potential source of strength. Finally, we articulate three design desiderata that could help promote communal spaces: make activity perceptible to the group, create appropriable steps, and build in fun choices. | cs | 1 |
Title: Balancing Adaptability and Non-exploitability in Repeated Games
Abstract: We study the problem of guaranteeing low regret in repeated games against an opponent with unknown membership in one of several classes. We add the constraint that our algorithm is non-exploitable, in that the opponent lacks an incentive to use an algorithm against which we cannot achieve rewards exceeding some "fair" value. Our solution is an expert algorithm (LAFF) that searches within a set of sub-algorithms that are optimal for each opponent class and uses a punishment policy upon detecting evidence of exploitation by the opponent. With benchmarks that depend on the opponent class, we show that LAFF has sublinear regret uniformly over the possible opponents, except exploitative ones, for which we guarantee that the opponent has linear regret. To our knowledge, this work is the first to provide guarantees for both regret and non-exploitability in multi-agent learning. | cs | 1 |
Title: Dynamics of point-vortex systems near thermal equilibrium: relaxation or not?
Abstract: This article is devoted to the long-time dynamics of point-vortex systems near thermal equilibrium and to the possible emergence of collisional relaxation. More precisely, we consider a tagged particle coupled to a large number of background particles that are initially at equilibrium, and we analyze its resulting slow dynamics. On the one hand, in the spirit of the Lenard-Balescu relaxation for plasmas, we establish in a generic setting the outset of the slow thermalization of the tagged particle. On the other hand, we show that a completely different phenomenology is also possible in some degenerate regime: the slow dynamics of the tagged particle then remains conservative and the thermalization no longer holds in a strict sense. We provide the first detailed description of this degenerate regime and of its mixing properties. Note that it is particularly delicate to handle due to statistical closure problems, which manifest themselves as a lack of self-adjointness of the effective Hamiltonian. | math | 0 |
Title: Thue-Morse constant is not badly approximable
Abstract: We prove that Thue-Morse constant $\tau_{TM}=0.01101001..._2$ is not a badly approximable number. Moreover, we prove that $\tau_{TM}(a)=0.01101001..._a$ is not badly approximable for every integer base $a\geq 2$ such that $a$ is not divisible by 15. At the same time we provide a precise formula for convergents of the Laurent series $\tilde{f}_{TM}(z) = z^{-1}\prod_{n=1}^\infty (1-z^{-2^n})$, thus developing further the research initiated by Alf van der Poorten and others. | math | 1 |
Title: The Influence of Biomedical Research on Future Business Funding: Analyzing Scientific Impact and Content in Industrial Investments
Abstract: This paper investigates the relationship between scientific innovation in biomedical sciences and its impact on industrial activities, focusing on how the historical impact and content of scientific papers influenced future funding and innovation grant application content for small businesses. The research incorporates bibliometric analyses along with SBIR (Small Business Innovation Research) data to yield a holistic view of the science-industry interface. By evaluating the influence of scientific innovation on industry across 10,873 biomedical topics and taking into account their taxonomic relationships, we present an in-depth exploration of science-industry interactions where we quantify the temporal effects and impact latency of scientific advancements on industrial activities, spanning from 2010 to 2021. Our findings indicate that scientific progress substantially influenced industrial innovation funding and the direction of industrial innovation activities. Approximately 76% and 73% of topics showed a correlation and Granger-causality between scientific interest in papers and future funding allocations to relevant small businesses. Moreover, around 74% of topics demonstrated an association between the semantic content of scientific abstracts and future grant applications. Overall, the work contributes to a more nuanced and comprehensive understanding of the science-industry interface, opening avenues for more strategic resource allocation and policy developments aimed at fostering innovation. | cs | 0 |
Title: The tensor product in the theory of Frobenius manifolds
Abstract: We introduce the operation of forming the tensor product in the theory of analytic Frobenius manifolds. Building on the results for formal Frobenius manifolds which we extend to the additional structures of Euler fields and flat identities, we prove that the tensor product of pointed germs of Frobenius manifolds exists. Furthermore, we define the notion of a tensor product diagram of Frobenius manifolds with factorizable flat identity and prove the existence such a diagram and hence a tensor product Frobenius manifold. These diagrams and manifolds are unique up to equivalence. Finally, we derive the special initial conditions for a tensor product of semi--simple Frobenius manifolds in terms of the special initial conditions of the factors. | math | 1 |
Title: Poisson summation for Hankel transforms
Abstract: In this article we study the Poisson summation for Hankel transform in the sense of Braverman-Kazhdan-Ngo in the special case of $L$-embedding $\rho: GL_1\rightarrow GL_2$. We view such a summation formula as the generalization of the classical Voronoi summation formula. | math | 1 |
Title: Interface spaces based on physics for multiscale mixed methods applied to flows in fractured-like porous media
Abstract: It is well known that domain-decomposition-based multiscale mixed methods rely on interface spaces, defined on the skeleton of the decomposition, to connect the solution among the non-overlapping subdomains. Usual spaces, such as polynomial-based ones, cannot properly represent high-contrast channelized features such as fractures (high permeability) and barriers (low permeability) for flows in heterogeneous porous media. We propose here new interface spaces, which are based on physics, to deal with permeability fields in the simultaneous presence of fractures and barriers, accommodated respectively, by the pressure and flux spaces. Existing multiscale methods based on mixed formulations can take advantage of the proposed interface spaces, however, in order to present and test our results, we use the newly developed Multiscale Robin Coupled Method (MRCM) [Guiraldello, et al., J. Comput. Phys., 355 (2018) pp. 1-21], which generalizes most well-known multiscale mixed methods, and allows for the independent choice of the pressure and flux interface spaces. An adaptive version of the MRCM [Rocha, et al., J. Comput. Phys., 409 (2020), 109316] is considered that automatically selects the physics-based pressure space for fractured structures and the physics-based flux space for regions with barriers, resulting in a procedure with unprecedented accuracy. The features of the proposed approach are investigated through several numerical simulations of single-phase and two-phase flows, in different heterogeneous porous media. The adaptive MRCM combined with the interface spaces based on physics provides promising results for challenging problems with the simultaneous presence of fractures and barriers. | math | 1 |
Title: On the first restricted cohomology of a reductive Lie algebra and its Borel subalgebras
Abstract: Let k be an algebraically closed field of characteristic p>0 and let G be a connected reductive group over k. Let B be a Borel subgroup of G and let g and b be the Lie algebras of G and B. Denote the first Frobenius kernels of G and B by G_1 and B_1. Furthermore, denote the algebras of polynomial functions on G and g by k[G] and k[g], and similar for B and b. The group G acts on k[G] via the conjugation action and on k[g] via the adjoint action. Similarly, B acts on k[B] via the conjugation action and on k[b] via the adjoint action. We show that, under certain mild assumptions, the cohomology groups H^1(G_1,k[g]), H^1(B_1,k[b]), H^1(G_1,k[G]) and H^1(B_1,k[B]) are zero. We also extend all our results to the cohomology for the higher Frobenius kernels. | math | 1 |
Title: On the shape factor of interaction laws for a non-local approximation of the Sobolev norm and the total variation
Abstract: We consider the family of non-local and non-convex functionals introduced by H. Brezis and H.-M. Nguyen in a recent paper. These functionals Gamma-converge to a multiple of the Sobolev norm or the total variation, depending on a summability exponent, but the exact values of the constants are unknown in many cases. We describe a new approach to the Gamma-convergence result that leads in some special cases to the exact value of the constants, and to the existence of smooth recovery families. | math | 1 |
Title: Rethinking Response Evaluation from Interlocutor's Eye for Open-Domain Dialogue Systems
Abstract: Open-domain dialogue systems have started to engage in continuous conversations with humans. Those dialogue systems are required to be adjusted to the human interlocutor and evaluated in terms of their perspective. However, it is questionable whether the current automatic evaluation methods can approximate the interlocutor's judgments. In this study, we analyzed and examined what features are needed in an automatic response evaluator from the interlocutor's perspective. The first experiment on the Hazumi dataset revealed that interlocutor awareness plays a critical role in making automatic response evaluation correlate with the interlocutor's judgments. The second experiment using massive conversations on X (formerly Twitter) confirmed that dialogue continuity prediction can train an interlocutor-aware response evaluator without human feedback while revealing the difficulty in evaluating generated responses compared to human responses. | cs | 0 |
Title: PBW bases and KLR algebras
Abstract: We generalize Lusztig's geometric construction of the PBW bases of finite quantum groups of type $\mathsf{ADE}$ under the framework of [Varagnolo-Vasserot, J. reine angew. Math. 659 (2011)]. In particular, every PBW basis of such quantum groups is proven to yield a semi-orthogonal collection in the module category of the KLR-algebras. This enables us to prove Lusztig's conjecture on the positivity of the canonical (lower global) bases in terms of the (lower) PBW bases in the $\mathsf{ADE}$ case. In addition, we verify Kashiwara's problem on the finiteness of the global dimensions of the KLR-algebras of type $\mathsf{ADE}$. | math | 1 |
Title: A Deep Reinforcement Learning Approach to Efficient Distributed Optimization
Abstract: In distributed optimization, the practical problem-solving performance is essentially sensitive to algorithm selection, parameter setting, problem type and data pattern. Thus, it is often laborious to acquire a highly efficient method for a given specific problem. In this paper, we propose a learning-based method to achieve efficient distributed optimization over networked systems. Specifically, a deep reinforcement learning (DRL) framework is developed for adaptive configuration within a parameterized unifying algorithmic form, which incorporates an abundance of decentralized first-order and second-order optimization algorithms. We exploit the local consensus and objective information to represent the regularities of problem instances and trace the solving progress, which constitute the states observed by a DRL agent. The framework is trained using Proximal Policy Optimization (PPO) on a number of practical problem instances of similar structures yet different problem data. Experiments on various smooth and non-smooth classes of objective functions demonstrate that our proposed learning-based method outperforms several state-of-the-art distributed optimization algorithms in terms of convergence speed and solution accuracy. | math | 0 |
Title: Two kinds of partial Motzkin paths with air pockets
Abstract: Motzkin paths with air pockets (MAP) are defined as a generalization of Dyck paths with air pockets by adding some horizontal steps with certain conditions. In this paper, we introduce two generalizations. The first one consists of lattice paths in $\Bbb{N}^2$ starting at the origin made of steps $U=(1,1)$, $D_k=(1,-k)$, $k\geq 1$ and $H=(1,0)$, where two down steps cannot be consecutive, while the second one are lattice paths in $\Bbb{N}^2$ starting at the origin, made of steps $U$, $D_k$ and $H$, where each step $D_k$ and $H$ is necessarily followed by an up step, except for the last step of the path. We provide enumerative results for these paths according to the length, the type of the last step, and the height of its end-point. A similar study is made for these paths read from right to left. As a byproduct, we obtain new classes of paths counted by the Motzkin numbers. Finally, we express our results using Riordan arrays. | math | 1 |
Title: Ramsey properties of random graphs and Folkman numbers
Abstract: For two graphs, $G$ and $F$, and an integer $r\ge2$ we write $G\rightarrow (F)_r$ if every $r$-coloring of the edges of $G$ results in a monochromatic copy of $F$. In 1995, the first two authors established a threshold edge probability for the Ramsey property $G(n,p)\to (F)_r$, where $G(n,p)$ is a random graph obtained by including each edge of the complete graph on $n$ vertices, independently, with probability $p$. The original proof was based on the regularity lemma of Szemer\'edi and this led to tower-type dependencies between the involved parameters. Here, for $r=2$, we provide a self-contained proof of a quantitative version of the Ramsey threshold theorem with only double exponential dependencies between the constants. As a corollary we obtain a double exponential upper bound on the 2-color Folkman numbers. By a different proof technique, a similar result was obtained independently by Conlon and Gowers. | math | 1 |
Title: Asymptotically compatible reproducing kernel collocation and meshfree integration for the peridynamic Navier equation
Abstract: In this work, we study the reproducing kernel (RK) collocation method for the peridynamic Navier equation. We first apply a linear RK approximation on both displacements and dilatation, then back-substitute dilatation, and solve the peridynamic Navier equation in a pure displacement form. The RK collocation scheme converges to the nonlocal limit and also to the local limit as nonlocal interactions vanish. The stability is shown by comparing the collocation scheme with the standard Galerkin scheme using Fourier analysis. We then apply the RK collocation to the quasi-discrete peridynamic Navier equation and show its convergence to the correct local limit when the ratio between the nonlocal length scale and the discretization parameter is fixed. The analysis is carried out on a special family of rectilinear Cartesian grids for the RK collocation method with a designated kernel with finite support. We assume the Lam\'{e} parameters satisfy $\lambda \geq \mu$ to avoid adding extra constraints on the nonlocal kernel. Finally, numerical experiments are conducted to validate the theoretical results. | math | 1 |
Title: On Newton polytopes of Lagrangian augmentations
Abstract: This note explores the use of Newton polytopes in the study of Lagrangian fillings of Legendrian submanifolds. In particular, we show that Newton polytopes associated to augmented values of Reeb chords can distinguish infinitely many distinct Lagrangian fillings, both for Legendrian links and higher-dimensional Legendrian spheres. The computations we perform work in finite characteristic, which significantly simplifies arguments and also allows us to show that there exist Legendrian links with infinitely many non-orientable exact Lagrangian fillings. | math | 0 |
Title: Entropy-minimizing dynamical transport on Riemannian manifolds
Abstract: Given a smooth Riemannian manifold $(M,g)$, compact and without boundary, we analyze the dynamical optimal mass transport problem where the cost is given by the sum of the kinetic energy and the relative entropy with respect to a reference volume measure $e^{-V}dx$. Under the only assumption that the prescribed marginals lie in $L^1(M)$, and a lower bound on the Ricci curvature, we characterize the minimal curves as unique weak solutions of the optimality system coupling the continuity equation with a backward Hamilton-Jacobi equation (with source given by $\log (m)$). We give evidence that the entropic cost enhances diffusive effects in the evolution of the optimal densities, proving $L^1\to L^\infty$ regularization in time for any initial-terminal data, and smoothness of the solutions whenever the marginals are positive and smooth. We use displacement convexity arguments (in the Eulerian approach) and gradient bounds from quasilinear elliptic equations. We also prove the convergence of optimal curves towards the classical Wasserstein geodesics, as the entropic term is multiplied by a vanishing parameter, showing that this kind of functionals can be used to build a smoothing approximation of the standard optimal transport problem. | math | 0 |
Title: Joint Beamforming and Offloading Design for Integrated Sensing, Communication and Computation System
Abstract: Mobile edge computing (MEC) is powerful to alleviate the heavy computing tasks in integrated sensing and communication (ISAC) systems. In this paper, we investigate joint beamforming and offloading design in a three-tier integrated sensing, communication and computation (ISCC) framework comprising one cloud server, multiple mobile edge servers, and multiple terminals. While executing sensing tasks, the user terminals can optionally offload sensing data to either MEC server or cloud servers. To minimize the execution latency, we jointly optimize the transmit beamforming matrices and offloading decision variables under the constraint of sensing performance. An alternating optimization algorithm based on multidimensional fractional programming is proposed to tackle the non-convex problem. Simulation results demonstrates the superiority of the proposed mechanism in terms of convergence and task execution latency reduction, compared with the state-of-the-art two-tier ISCC framework. | cs | 0 |
Title: Rationality of holomorphic vertex operator algebras
Abstract: We prove that if V is a unitary simple holomorphic vertex operator algebra of CFT type, then V is rational, that is, all N-gradable V-modules are direct sums of copies of V. | math | 0 |
Title: Integer Forcing-and-Forward Transceiver Design for MIMO Multi-Pair Two-Way Relaying
Abstract: In this paper, we propose a new transmission scheme, named as Integer Forcing-and-Forward (IFF), for communications among multi-pair multiple-antenna users in which each pair exchanges their messages with the help of a single multi antennas relay in the multiple-access and broadcast phases. The proposed scheme utilizes Integer Forcing Linear Receiver (IFLR) at relay, which uses equations, i.e., linear integer-combinations of messages, to harness the intra-pair interference. Accordingly, we propose the design of mean squared error (MSE) based transceiver, including precoder and projection matrices for the relay and users, assuming that the perfect channel state information (CSI) is available. In this regards, in the multiple-access phase, we introduce two new MSE criteria for the related precoding and filter designs, i.e., the sum of the equations MSE (Sum-Equation MSE) and the maximum of the equations MSE (Max-Equation MSE), to exploit the equations in the relay. In addition, the convergence of the proposed criteria is proven as well. Moreover, in the broadcast phase, we use the two traditional MSE criteria, i.e. the sum of the users' mean squred errors (Sum MSE) and the maximum of the users' mean squared errors (Max MSE), to design the related precoding and filters for recovering relay's equations by the users. Then, we consider a more practical scenario with imperfect CSI. For this case, IFLR receiver is modified, and another transceiver design is proposed, which take into account the effect of channels estimation error. We evaluate the performance of our proposed strategy and compare the results with the conventional amplify-and-forward (AF) and denoise-and-forward (DF) strategies for the same scenario. The results indicate the substantial superiority of the proposed strategy in terms of the outage probability and the sum rate. | cs | 1 |
Title: Neural Collapse for Cross-entropy Class-Imbalanced Learning with Unconstrained ReLU Feature Model
Abstract: The current paradigm of training deep neural networks for classification tasks includes minimizing the empirical risk that pushes the training loss value towards zero, even after the training error has been vanished. In this terminal phase of training, it has been observed that the last-layer features collapse to their class-means and these class-means converge to the vertices of a simplex Equiangular Tight Frame (ETF). This phenomenon is termed as Neural Collapse (NC). To theoretically understand this phenomenon, recent works employ a simplified unconstrained feature model to prove that NC emerges at the global solutions of the training problem. However, when the training dataset is class-imbalanced, some NC properties will no longer be true. For example, the class-means geometry will skew away from the simplex ETF when the loss converges. In this paper, we generalize NC to imbalanced regime for cross-entropy loss under the unconstrained ReLU feature model. We prove that, while the within-class features collapse property still holds in this setting, the class-means will converge to a structure consisting of orthogonal vectors with different lengths. Furthermore, we find that the classifier weights are aligned to the scaled and centered class-means with scaling factors depend on the number of training samples of each class, which generalizes NC in the class-balanced setting. We empirically prove our results through experiments on practical architectures and dataset. | cs | 0 |
Title: Estimating continuous data of wrist joint angles using ultrasound images
Abstract: Ultrasound imaging has recently been introduced as a sensing interface for joint motion estimation. The use of ultrasound images as an estimation method is expected to improve the control performance of assistive devices and human--machine interfaces. This study aimed to estimate continuous wrist joint angles using ultrasound images. Specifically, in an experiment, joint angle information was obtained during extension--flexion movements, and ultrasound images of the associated muscles were acquired. Using the features obtained from ultrasound images, a multivariate linear regression model was used to estimate the joint angles. The coordinates of the feature points obtained using optical flow from the ultrasound images were used as explanatory variables of the multivariate linear regression model. The model was trained and tested for each trial by each participant to verify the estimation accuracy. The results show that the mean and standard deviation of the estimation accuracy for all trials were root mean square error (RMSE)=1.82 $\pm$ 0.54 deg and coefficient of determination (R2)=0.985 $\pm$ 0.009. Our method achieves a highly accurate estimation of joint angles compared with previous studies using other signals, such as surface electromyography, while the multivariate linear regression model is simple and both computational and model training costs are low. | cs | 0 |
Title: Global well-posedness for the Cauchy problem of the Zakharov-Kuznetsov equation on cylindrical spaces
Abstract: We prove that the Zakharov-Kuznetsov equation on cylindrical spaces is globally well-posed below the energy norm. As is known, local well-posedness below energy space was obtained by the first author. We adapt I-method to extend the solutions globally in time. Using modified energies, we obtain the polynomial bounds on the $H^s$ growth for the global solutions. | math | 0 |
Title: Hessian estimates for special Lagrangian equation by doubling
Abstract: New, doubling proofs are given for the interior Hessian estimates of the special Lagrangian equation. These estimates were originally shown by Chen-Warren-Yuan in CPAM 2009 and Wang-Yuan in AJM 2014. This yields a higher codimension analogue of Korevaar's 1987 pointwise proof of the gradient estimate for minimal hypersurfaces, without using the Michael-Simon mean value inequality. | math | 0 |
Title: Towards Fully Decoupled End-to-End Person Search
Abstract: End-to-end person search aims to jointly detect and re-identify a target person in raw scene images with a unified model. The detection task unifies all persons while the re-id task discriminates different identities, resulting in conflict optimal objectives. Existing works proposed to decouple end-to-end person search to alleviate such conflict. Yet these methods are still sub-optimal on one or two of the sub-tasks due to their partially decoupled models, which limits the overall person search performance. In this paper, we propose to fully decouple person search towards optimal person search. A task-incremental person search network is proposed to incrementally construct an end-to-end model for the detection and re-id sub-task, which decouples the model architecture for the two sub-tasks. The proposed task-incremental network allows task-incremental training for the two conflicting tasks. This enables independent learning for different objectives thus fully decoupled the model for persons earch. Comprehensive experimental evaluations demonstrate the effectiveness of the proposed fully decoupled models for end-to-end person search. | cs | 0 |
Title: FairGridSearch: A Framework to Compare Fairness-Enhancing Models
Abstract: Machine learning models are increasingly used in critical decision-making applications. However, these models are susceptible to replicating or even amplifying bias present in real-world data. While there are various bias mitigation methods and base estimators in the literature, selecting the optimal model for a specific application remains challenging. This paper focuses on binary classification and proposes FairGridSearch, a novel framework for comparing fairness-enhancing models. FairGridSearch enables experimentation with different model parameter combinations and recommends the best one. The study applies FairGridSearch to three popular datasets (Adult, COMPAS, and German Credit) and analyzes the impacts of metric selection, base estimator choice, and classification threshold on model fairness. The results highlight the significance of selecting appropriate accuracy and fairness metrics for model evaluation. Additionally, different base estimators and classification threshold values affect the effectiveness of bias mitigation methods and fairness stability respectively, but the effects are not consistent across all datasets. Based on these findings, future research on fairness in machine learning should consider a broader range of factors when building fair models, going beyond bias mitigation methods alone. | cs | 0 |
Title: Chromatic symmetric function of graphs from Borcherds algebras
Abstract: Let $\mathfrak g$ be a Borcherds algebra with the associated graph $G$. We prove that the chromatic symmetric function of $G$ can be recovered from the Weyl denominator identity of $\mathfrak g$ and this gives a Lie theoretic proof of Stanley's expression for chromatic symmetric function in terms of power sum symmetric function. Also, this gives an expression for chromatic symmetric function of $G$ in terms of root multiplicities of $\lie g$. The absolute value of the linear coefficient of the chromatic polynomial of $G$ is known as the chromatic discriminant of $G$. As an application of our main theorem, we prove that graphs with different chromatic discriminants are distinguished by their chromatic symmetric functions. Also, we find a connection between the Weyl denominators and the $G$-elementary symmetric functions. Using this connection, we give a Lie theoretic proof of non-negativity of coefficients of $G$-power sum symmetric functions. | math | 1 |
Title: Isometric immersions of Riemannian manifolds in $k$-codimensional Euclidean space
Abstract: We use a new method to give conditions for the existence of a local isometric immersion of a Riemannian $n$-manifold $M$ in $\mathbb{R}^{n+k}$, for a given $n$ and $k$. These equate to the (local) existence of a $k$-tuple of scalar fields on the manifold, satisfying a certain non-linear equation involving the Riemannian curvature tensor of $M$. Setting $k=1$, we proceed to recover the fundamental theorem of hypersurfaces. In the case of manifolds of positive sectional curvature and $n\geq 3$, we reduce the solvability of the Gauss and Codazzi equations to the cancelation of a set of obstructions involving the logarithm of the Riemann curvature operator. The resulting theorem has a structural similarity to the Weyl-Schouten theorem, suggesting a parallelism between conformally flat $n$-manifolds and those that admit an isometric immersion in $\mathbb{R}^{n+1}$. | math | 1 |
Title: The crystalline measure that is not a Fourier Quasicrystal
Abstract: We construct a crystalline measure on the real line, which is not a Fourier Quasicrystal. | math | 0 |
Title: Efficient iterative methods for hyperparameter estimation in large-scale linear inverse problems
Abstract: We study Bayesian methods for large-scale linear inverse problems, focusing on the challenging task of hyperparameter estimation. Typical hierarchical Bayesian formulations that follow a Markov Chain Monte Carlo approach are possible for small problems with very few hyperparameters but are not computationally feasible for problems with a very large number of unknown parameters. In this work, we describe an empirical Bayesian (EB) method to estimate hyperparameters that maximize the marginal posterior, i.e., the probability density of the hyperparameters conditioned on the data, and then we use the estimated values to compute the posterior of the inverse parameters. For problems where the computation of the square root and inverse of prior covariance matrices are not feasible, we describe an approach based on the generalized Golub-Kahan bidiagonalization to approximate the marginal posterior and seek hyperparameters that minimize the approximate marginal posterior. Numerical results from seismic and atmospheric tomography demonstrate the accuracy, robustness, and potential benefits of the proposed approach. | math | 0 |
Title: Deep Recurrent Level Set for Segmenting Brain Tumors
Abstract: Variational Level Set (VLS) has been a widely used method in medical segmentation. However, segmentation accuracy in the VLS method dramatically decreases when dealing with intervening factors such as lighting, shadows, colors, etc. Additionally, results are quite sensitive to initial settings and are highly dependent on the number of iterations. In order to address these limitations, the proposed method incorporates VLS into deep learning by defining a novel end-to-end trainable model called as Deep Recurrent Level Set (DRLS). The proposed DRLS consists of three layers, i.e, Convolutional layers, Deconvolutional layers with skip connections and LevelSet layers. Brain tumor segmentation is taken as an instant to illustrate the performance of the proposed DRLS. Convolutional layer learns visual representation of brain tumor at different scales. Since brain tumors occupy a small portion of the image, deconvolutional layers are designed with skip connections to obtain a high quality feature map. Level-Set Layer drives the contour towards the brain tumor. In each step, the Convolutional Layer is fed with the LevelSet map to obtain a brain tumor feature map. This in turn serves as input for the LevelSet layer in the next step. The experimental results have been obtained on BRATS2013, BRATS2015 and BRATS2017 datasets. The proposed DRLS model improves both computational time and segmentation accuracy when compared to the the classic VLS-based method. Additionally, a fully end-to-end system DRLS achieves state-of-the-art segmentation on brain tumors. | cs | 1 |
Title: Debiased Cross-modal Matching for Content-based Micro-video Background Music Recommendation
Abstract: Micro-video background music recommendation is a complicated task where the matching degree between videos and uploader-selected background music is a major issue. However, the selection of the user-generated content (UGC) is biased caused by knowledge limitations and historical preferences among music of each uploader. In this paper, we propose a Debiased Cross-Modal (DebCM) matching model to alleviate the influence of such selection bias. Specifically, we design a teacher-student network to utilize the matching of segments of music videos, which is professional-generated content (PGC) with specialized music-matching techniques, to better alleviate the bias caused by insufficient knowledge of users. The PGC data is captured by a teacher network to guide the matching of uploader-selected UGC data of the student network by KL-based knowledge transfer. In addition, uploaders' personal preferences of music genres are identified as confounders that spuriously correlate music embeddings and background music selections, resulting in the learned recommender system to over-recommend music from the majority groups. To resolve such confounders in the UGC data of the student network, backdoor adjustment is utilized to deconfound the spurious correlation between music embeddings and prediction scores. We further utilize Monte Carlo (MC) estimator with batch-level average as the approximations to avoid integrating the entire confounder space calculated by the adjustment. Extensive experiments on the TT-150k-genre dataset demonstrate the effectiveness of the proposed method towards the selection bias. The code is publicly available on: \url{https://github.com/jing-1/DebCM}. | cs | 1 |
Title: Separable homology of graphs and the Whitehead complex
Abstract: We introduce the Whitehead complex, a one-complex associated to a finite regular cover of the rose and show that it is connected if and only if the fundamental group of the associated cover is generated by its intersection with the set of elements in proper free factors of $\mathbf{F}_n$. The Whitehead complex admits an action of $\mathrm{Out}(\mathbf{F}_n)$ by isometries if the associated cover corresponds to a characteristic subgroup of $\mathbf{F}_n$. We prove that the Whitehead complex of the rose has infinite diameter and is nonhyperbolic, implying it is not quasi-isometric to the free splitting complex or the free factor complex. | math | 0 |
Title: Compatibility of Hodge Theory on Alexander Modules
Abstract: Let $U$ be a smooth connected complex algebraic variety, and let $f\colon U\to \mathbb C^*$ be an algebraic map. To the pair $(U,f)$ one can associate an infinite cyclic cover $U^f$, and (homology) Alexander modules are defined as the homology groups of this cover. In two recent works, the first of which is joint with Geske, Maxim and Wang, we developed two different ways to put a mixed Hodge structure on Alexander modules. Since they are not finite dimensional in general, each approach replaces the Alexander module by a different finite dimensional module: one of them takes the torsion submodule, the other takes finite dimensional quotients, and the constructions are not directly comparable. In this note, we show that both constructions are compatible, in the sense that the map from the torsion to the quotients is a mixed Hodge structure morphism. | math | 0 |
Title: Cartan calculus for $C^\infty$-ringed spaces
Abstract: In an earlier paper (arXiv:2212.11163) I constructed a complex of differential forms on a local $C^\infty$-ringed space. In this paper I define a sheaf of vector fields (``the tangent sheaf'') on a local $C^\infty$-ringed space, define contractions of vector fields and forms, Lie derivatives of forms with respect to vector fields, and show that the standard equations of Cartan calculus hold for vector fields and differential forms on local $C^\infty$-ringed spaces. | math | 0 |
Title: ETTR Bounds and Approximation Solutions of Blind Rendezvous Policies in Cognitive Radio Networks with Random Channel States
Abstract: In this paper, we consider the multichannel rendezvous problem in cognitive radio networks (CRNs) where the probability that two users hopping on the same channel have a successful rendezvous is a function of channel states. The channel states are modeled by stochastic processes with joint distributions known to users. However, the exact state of a channel at any time is not observable. We first consider two channel models: (i) the fast time-varying channel model (where the channel states are assumed to be independent and identically distributed in each time slot), and (ii) the slow time-varying channel model (where the channel states remain unchanged over time). Among the classes of the blind rendezvous policies that randomly hop on channels according to certain channel selection probabilities, we show the optimal channel selection policy that minimizes the expected time-to-rendezvous (ETTR) is the single selection policy that hops on the ``best'' channel all the time in the fast time-varying channel model. However, for the slow time-varying channel model, it is much more difficult to find the optimal channel selection policy. By using the majorization ordering, we derive a lower bound and an upper bound for the ETTR under the assumption that the channel states are exchangeable random variables. Bases on these bounds, we then prove various approximation solutions. We then extend our results to general channel models where the joint distribution of the channel states is only assumed to be stationary in time. | cs | 1 |
Title: Simple Combinatorial Algorithms for Combinatorial Bandits: Corruptions and Approximations
Abstract: We consider the stochastic combinatorial semi-bandit problem with adversarial corruptions. We provide a simple combinatorial algorithm that can achieve a regret of $\tilde{O}\left(C+d^2K/\Delta_{min}\right)$ where $C$ is the total amount of corruptions, $d$ is the maximal number of arms one can play in each round, $K$ is the number of arms. If one selects only one arm in each round, we achieves a regret of $\tilde{O}\left(C+\sum_{\Delta_i>0}(1/\Delta_i)\right)$. Our algorithm is combinatorial and improves on the previous combinatorial algorithm by [Gupta et al., COLT2019] (their bound is $\tilde{O}\left(KC+\sum_{\Delta_i>0}(1/\Delta_i)\right)$), and almost matches the best known bounds obtained by [Zimmert et al., ICML2019] and [Zimmert and Seldin, AISTATS2019] (up to logarithmic factor). Note that the algorithms in [Zimmert et al., ICML2019] and [Zimmert and Seldin, AISTATS2019] require one to solve complex convex programs while our algorithm is combinatorial, very easy to implement, requires weaker assumptions and has very low oracle complexity and running time. We also study the setting where we only get access to an approximation oracle for the stochastic combinatorial semi-bandit problem. Our algorithm achieves an (approximation) regret bound of $\tilde{O}\left(d\sqrt{KT}\right)$. Our algorithm is very simple, only worse than the best known regret bound by $\sqrt{d}$, and has much lower oracle complexity than previous work. | cs | 1 |
Title: Interacting stochastic processes on sparse random graphs
Abstract: Large ensembles of stochastically evolving interacting particles describe phenomena in diverse fields including statistical physics, neuroscience, biology, and engineering. In such systems, the infinitesimal evolution of each particle depends only on its own state (or history) and the states (or histories) of neighboring particles with respect to an underlying, possibly random, interaction graph. While these high-dimensional processes are typically too complex to be amenable to exact analysis, their dynamics are quite well understood when the interaction graph is the complete graph. In this case, classical theorems show that in the limit as the number of particles goes to infinity, the dynamics of the empirical measure and the law of a typical particle coincide and can be characterized in terms of a much more tractable dynamical system of reduced dimension called the mean-field limit. In contrast, until recently not much was known about corresponding convergence results in the complementary case when the interaction graph is sparse (i.e., with uniformly bounded average degree). This article provides a brief survey of classical work and then describes recent progress on the sparse regime that relies on a combination of techniques from random graph theory, Markov random fields, and stochastic analysis. The article concludes by discussing ramifications for applications and posing several open problems. | math | 0 |
Title: Box complexes: at the crossroad of graph theory and topology
Abstract: Various simplicial complexes can be associated with a graph. Box complexes form an important families of such simplicial complexes and are especially useful for providing lower bounds on the chromatic number of the graph via some of their topological properties. They provide thus a fascinating topic mixing topology and discrete mathematics. This paper is intended to provide an up-do-date survey on box complexes. It is based on classical results and recent findings from the literature, but also establishes new results improving our current understanding of the topic, and identifies several challenging open questions. | math | 0 |
Title: Large and moderate deviations for Gaussian neural networks
Abstract: We prove large and moderate deviations for the output of Gaussian fully connected neural networks. The main achievements concern deep neural networks (i.e., when the model has more than one hidden layer) and hold for bounded and continuous pre-activation functions. However, for deep neural networks fed by a single input, we have results even if the pre-activation is ReLU. When the network is shallow (i.e., there is exactly one hidden layer) the large and moderate principles hold for quite general pre-activations and in an infinite-dimensional setting. | math | 0 |
Title: On transfer maps in the algebraic $K$-theory of spaces
Abstract: We show that the Waldhausen trace map $\mathrm{Tr}_X \colon A(X) \to QX_+$, which defines a natural splitting map from the algebraic $K$-theory of spaces to stable homotopy, is natural up to \emph{weak} homotopy with respect to transfer maps in algebraic $K$-theory and Becker-Gottlieb transfer maps respectively. | math | 1 |
Title: Query Based Access Control for Linked Data
Abstract: In recent years we have seen significant advances in the technology used to both publish and consume Linked Data. However, in order to support the next generation of ebusiness applications on top of interlinked machine readable data suitable forms of access control need to be put in place. Although a number of access control models and frameworks have been put forward, very little research has been conducted into the security implications associated with granting access to partial data or the correctness of the proposed access control mechanisms. Therefore the contributions of this paper are two fold: we propose a query rewriting algorithm which can be used to partially restrict access to SPARQL 1.1 queries and updates; and we demonstrate how a set of criteria, which was originally used to verify that an access control policy holds over different database states, can be adapted to verify the correctness of access control via query rewriting. | cs | 1 |
Title: EPA: Neural Collapse Inspired Robust Out-of-Distribution Detector
Abstract: Out-of-distribution (OOD) detection plays a crucial role in ensuring the security of neural networks. Existing works have leveraged the fact that In-distribution (ID) samples form a subspace in the feature space, achieving state-of-the-art (SOTA) performance. However, the comprehensive characteristics of the ID subspace still leave under-explored. Recently, the discovery of Neural Collapse ($\mathcal{NC}$) sheds light on novel properties of the ID subspace. Leveraging insight from $\mathcal{NC}$, we observe that the Principal Angle between the features and the ID feature subspace forms a superior representation for measuring the likelihood of OOD. Building upon this observation, we propose a novel $\mathcal{NC}$-inspired OOD scoring function, named Entropy-enhanced Principal Angle (EPA), which integrates both the global characteristic of the ID subspace and its inner property. We experimentally compare EPA with various SOTA approaches, validating its superior performance and robustness across different network architectures and OOD datasets. | cs | 0 |
Title: Extremal results for odd cycles in sparse pseudorandom graphs
Abstract: We consider extremal problems for subgraphs of pseudorandom graphs. For graphs $F$ and $\Gamma$ the generalized Tur\'an density $\pi_F(\Gamma)$ denotes the density of a maximum subgraph of $\Gamma$, which contains no copy of~$F$. Extending classical Tur\'an type results for odd cycles, we show that $\pi_{F}(\Gamma)=1/2$ provided $F$ is an odd cycle and $\Gamma$ is a sufficiently pseudorandom graph. In particular, for $(n,d,\lambda)$-graphs $\Gamma$, i.e., $n$-vertex, $d$-regular graphs with all non-trivial eigenvalues in the interval $[-\lambda,\lambda]$, our result holds for odd cycles of length $\ell$, provided \[ \lambda^{\ell-2}\ll \frac{d^{\ell-1}}n\log(n)^{-(\ell-2)(\ell-3)}\,. \] Up to the polylog-factor this verifies a conjecture of Krivelevich, Lee, and Sudakov. For triangles the condition is best possible and was proven previously by Sudakov, Szab\'o, and Vu, who addressed the case when $F$ is a complete graph. A construction of Alon and Kahale (based on an earlier construction of Alon for triangle-free $(n,d,\lambda)$-graphs) shows that our assumption on $\Gamma$ is best possible up to the polylog-factor for every odd $\ell\geq 5$. | math | 1 |
Title: A proximal point algorithm for sequential feature extraction applications
Abstract: We propose a proximal point algorithm to solve LAROS problem, that is the problem of finding a "large approximately rank-one submatrix". This LAROS problem is used to sequentially extract features in data. We also develop a new stopping criterion for the proximal point algorithm, which is based on the duality conditions of \eps-optimal solutions of the LAROS problem, with a theoretical guarantee. We test our algorithm with two image databases and show that we can use the LAROS problem to extract appropriate common features from these images. | math | 1 |
Title: Tramp Ship Scheduling Problem with Berth Allocation Considerations and Time-dependent Constraints
Abstract: This work presents a model for the Tramp Ship Scheduling problem including berth allocation considerations, motivated by a real case of a shipping company. The aim is to determine the travel schedule for each vessel considering multiple docking and multiple time windows at the berths. This work is innovative due to the consideration of both spatial and temporal attributes during the scheduling process. The resulting model is formulated as a mixed-integer linear programming problem, and a heuristic method to deal with multiple vessel schedules is also presented. Numerical experimentation is performed to highlight the benefits of the proposed approach and the applicability of the heuristic. Conclusions and recommendations for further research are provided. | cs | 1 |
Title: On Error and Compression Rates for Prototype Rules
Abstract: We study the close interplay between error and compression in the non-parametric multiclass classification setting in terms of prototype learning rules. We focus in particular on a recently proposed compression-based learning rule termed OptiNet (Kontorovich, Sabato, and Urner 2016; Kontorovich, Sabato, and Weiss 2017; Hanneke et al. 2021). Beyond its computational merits, this rule has been recently shown to be universally consistent in any metric instance space that admits a universally consistent rule--the first learning algorithm known to enjoy this property. However, its error and compression rates have been left open. Here we derive such rates in the case where instances reside in Euclidean space under commonly posed smoothness and tail conditions on the data distribution. We first show that OptiNet achieves non-trivial compression rates while enjoying near minimax-optimal error rates. We then proceed to study a novel general compression scheme for further compressing prototype rules that locally adapts to the noise level without sacrificing accuracy. Applying it to OptiNet, we show that under a geometric margin condition, further gain in the compression rate is achieved. Experimental results comparing the performance of the various methods are presented. | cs | 1 |
Title: Impact of RIS on Outage Probability and Ergodic Rate in Wireless Powered Communication
Abstract: Wireless powered communication (WPC) combines information and energy transmission for energy-constrained nodes. Reconfigurable intelligent surfaces (RISs) are capable of controlling radio signals in a dynamic and goal-oriented manner. This paper investigates the combination of RIS and WPC to enhance the performance of an energy-constrained user. Using an RIS, a base station, and a wireless user transmit energy and information signals, respectively. We derive closed-form expressions for outage probability and secrecy rate to analyze the performance of the proposed framework. Based on the theoretical analysis and simulation results, valuable insights are revealed and parameter selection is demonstrated. | cs | 0 |
Title: Compositing with 2D Vector Fields by using Shape Maps that can represent Inconsistent, Impossible, and Incoherent Shapes
Abstract: In this paper, we present a new compositing approach to obtain stylized reflections and refractions with a simple control. Our approach does not require any mask or separate 3D rendering. Moreover, only one additional image is sufficient to obtain a composited image with convincing qualitative reflection and refraction effects. We have also developed linearized methods that are easy to compute. Although these methods do not directly correspond to the underlying physical phenomena of reflection and refraction, they can provide results that are visually similar to realistic 3D rendering. The main advantage of this approach is the ability to treat images as ``mock-3D'' shapes that can be inserted into any digital paint system without any significant structural change. The core of our approach is the shape map, which encodes 2D shape and thickness information for all visible points of an image of a shape. This information does not have to be complete or consistent to obtain interesting composites. In particular, the shape maps allow us to represent impossible and incoherent shapes with 2D non-conservative vector fields. | cs | 0 |
Title: Fast Discrete Linear Canonical Transform Based on CM-CC-CM Decomposition and FFT
Abstract: In this paper, a discrete LCT (DLCT) irrelevant to the sampling periods and without oversampling operation is developed. This DLCT is based on the well-known CM-CC-CM decomposition, that is, implemented by two discrete chirp multiplications (CMs) and one discrete chirp convolution (CC). This decomposition doesn't use any scaling operation which will change the sampling period or cause the interpolation error. Compared with previous works, DLCT calculated by direct summation and DLCT based on center discrete dilated Hermite functions (CDDHFs), the proposed method implemented by FFTs has much lower computational complexity. The relation between the proposed DLCT and the continuous LCT is also derived to approximate the samples of the continuous LCT. Simulation results show that the proposed method somewhat outperforms the CDDHFs-based method in the approximation accuracy. Besides, the proposed method has approximate additivity property with error as small as the CDDHFs-based method. Most importantly, the proposed method has perfect reversibility, which doesn't hold in many existing DLCTs. With this property, it is unnecessary to develop the inverse DLCT additionally because it can be replaced by the forward DLCT. | cs | 1 |
Title: Rigorous uniaxial limit of the Qian--Sheng inertial Q-tensor hydrodynamics for liquid crystals
Abstract: This article is concerned with the rigorous connections between the inertial Qian--Sheng model and the Ericksen--Leslie model for the liquid crystal flow, under a more general condition of coefficients. More specifically, in the framework of Hilbert expansions, we show that: (i) when the elastic coefficients tend to zero (also called the uniaxial limit), the smooth solution to the inertial Qian--Sheng model converges to that to the full inertial Ericksen--Leslie model; (ii) when the elastic coefficients and the inertial coefficient tend to zero simultaneously, the smooth solution to the inertial Qian--Sheng model converges to that to the noninertial Ericksen--Leslie model. | math | 0 |
Title: Using Malliavin calculus to solve a chemical diffusion master equation
Abstract: We propose a novel method to solve a chemical diffusion master equation of birth and death type. This is an infinite system of Fokker-Planck equations where the different components are coupled by reaction dynamics similar in form to a chemical master equation. This system was proposed in [3] for modelling the probabilistic evolution of chemical reaction kinetics associated with spatial diffusion of individual particles. Using some basic tools and ideas from infinite dimensional Gaussian analysis we are able to reformulate the aforementioned infinite system of Fokker-Planck equations as a single evolution equation solved by a generalized stochastic process and written in terms of Malliavin derivatives and differential second quantization operators. Via this alternative representation we link certain finite dimensional projections of the solution of the original problem to the solution of a single partial differential equations of Ornstein-Uhlenbeck type containing as many variables as the dimension of the aforementioned projection space. | math | 1 |
Title: Lightweight Fish Classification Model for Sustainable Marine Management: Indonesian Case
Abstract: The enormous demand for seafood products has led to exploitation of marine resources and near-extinction of some species. In particular, overfishing is one the main issues in sustainable marine development. In alignment with the protection of marine resources and sustainable fishing, this study proposes to advance fish classification techniques that support identifying protected fish species using state-of-the-art machine learning. We use a custom modification of the MobileNet model to design a lightweight classifier called M-MobileNet that is capable of running on limited hardware. As part of the study, we compiled a labeled dataset of 37,462 images of fish found in the waters of the Indonesian archipelago. The proposed model is trained on the dataset to classify images of the captured fish into their species and give recommendations on whether they are consumable or not. Our modified MobileNet model uses only 50\% of the top layer parameters with about 42% GTX 860M utility and achieves up to 97% accuracy in fish classification and determining its consumability. Given the limited computing capacity available on many fishing vessels, the proposed model provides a practical solution to on-site fish classification. In addition, synchronized implementation of the proposed model on multiple vessels can supply valuable information about the movement and location of different species of fish. | cs | 0 |
Title: On-the-fly Adaptation of Patrolling Strategies in Changing Environments
Abstract: We consider the problem of efficient patrolling strategy adaptation in a changing environment where the topology of Defender's moves and the importance of guarded targets change unpredictably. The Defender must instantly switch to a new strategy optimized for the new environment, not disrupting the ongoing patrolling task, and the new strategy must be computed promptly under all circumstances. Since strategy switching may cause unintended security risks compromising the achieved protection, our solution includes mechanisms for detecting and mitigating this problem. The efficiency of our framework is evaluated experimentally. | cs | 1 |
Title: Evaluating Fairness in Self-supervised and Supervised Models for Sequential Data
Abstract: Self-supervised learning (SSL) has become the de facto training paradigm of large models where pre-training is followed by supervised fine-tuning using domain-specific data and labels. Hypothesizing that SSL models would learn more generic, hence less biased, representations, this study explores the impact of pre-training and fine-tuning strategies on fairness (i.e., performing equally on different demographic breakdowns). Motivated by human-centric applications on real-world timeseries data, we interpret inductive biases on the model, layer, and metric levels by systematically comparing SSL models to their supervised counterparts. Our findings demonstrate that SSL has the capacity to achieve performance on par with supervised methods while significantly enhancing fairness--exhibiting up to a 27% increase in fairness with a mere 1% loss in performance through self-supervision. Ultimately, this work underscores SSL's potential in human-centric computing, particularly high-stakes, data-scarce application domains like healthcare. | cs | 0 |
Title: Invariance of Abel universality under composition and applications
Abstract: A holomorphic function $f$ on the unit disc $\mathbb{D}$ belongs to the class $\mathcal{U}_A (\mathbb{D})$ of Abel universal functions if the family $\{f_r: 0\leq r<1\}$ of its dilates $f_r(z):=f(rz)$ is dense in the Banach space of all continuous functions on $K$, endowed with the supremum norm, for any proper compact subset $K$ of the unit circle. We prove that this property is invariant under composition from the left with any non-constant entire function. As an application, we show that $\mathcal{U}_A (\mathbb{D})$ is strongly-algebrable. Furthermore, we prove that Abel universality is invariant under composition from the right with an automorphism $\Phi$ of $\mathbb{D}$ if and only if $\Phi$ a rotation. On the other hand, we establish the existence of a subset of $\mathcal{U}_A (\mathbb{D})$ which is residual in the space of holomorphic functions on $\mathbb{D}$ and is invariant under composition from the right with any automorphism of $\mathbb{D}$. | math | 0 |
Title: An efficient implementable inexact entropic proximal point algorithm for a class of linear programming problems
Abstract: We introduce a class of specially structured linear programming (LP) problems, which has favorable modeling capability for important application problems in different areas such as optimal transport, discrete tomography and economics. To solve these generally large-scale LP problems efficiently, we design an implementable inexact entropic proximal point algorithm (iEPPA) combined with an easy-to-implement dual block coordinate descent method as a subsolver. Unlike existing entropy-type proximal point algorithms, our iEPPA employs a more practically checkable stopping condition for solving the associated subproblems while achieving provable convergence. Moreover, when solving the capacity constrained multi-marginal optimal transport (CMOT) problem (a special case of our LP problem), our iEPPA is able to bypass the underlying numerical instability issues that often appear in the popular entropic regularization approach, since our algorithm does not require the proximal parameter to be very small in order to obtain an accurate approximate solution. Numerous numerical experiments show that our iEPPA is efficient and robust for solving large-scale CMOT problems. The experiments on the discrete tomography problem also highlight the potential modeling power of our model. | math | 1 |
Title: Heavy Ball Neural Ordinary Differential Equations
Abstract: We propose heavy ball neural ordinary differential equations (HBNODEs), leveraging the continuous limit of the classical momentum accelerated gradient descent, to improve neural ODEs (NODEs) training and inference. HBNODEs have two properties that imply practical advantages over NODEs: (i) The adjoint state of an HBNODE also satisfies an HBNODE, accelerating both forward and backward ODE solvers, thus significantly reducing the number of function evaluations (NFEs) and improving the utility of the trained models. (ii) The spectrum of HBNODEs is well structured, enabling effective learning of long-term dependencies from complex sequential data. We verify the advantages of HBNODEs over NODEs on benchmark tasks, including image classification, learning complex dynamics, and sequential modeling. Our method requires remarkably fewer forward and backward NFEs, is more accurate, and learns long-term dependencies more effectively than the other ODE-based neural network models. Code is available at \url{https://github.com/hedixia/HeavyBallNODE}. | cs | 1 |
Title: Lie Algebroids and generalized projective structures on Riemann surfaces
Abstract: The space of generalized projective structures on a Riemann surface $\Sigma$ of genus g with n marked points is the affine space over the cotangent bundle to the space of SL(N)-opers. It is a phase space of $W_N$-gravity on $\Sigma\times\mathbb{R}$. This space is a generalization of the space of projective structures on the Riemann surface. We define the moduli space of $W_N$-gravity as a symplectic quotient with respect to the canonical action of a special class of Lie algebroids. This moduli space describes in particular the moduli space of deformations of complex structures on the Riemann surface by differential operators of finite order, or equivalently, by a quotient space of Volterra operators. We call these algebroids the Adler-Gelfand-Dikii (AGD) algebroids, because they are constructed by means of AGD bivector on the space of opers restricted on a circle. The AGD-algebroids are particular case of Lie algebroids related to a Poisson sigma-model. The moduli space of the generalized projective structure can be described by cohomology of a BRST-complex. | math | 1 |
Title: Finite subgraphs of an extension graph
Abstract: Let $\Gamma$ be a finite graph and let $\Gamma^{\mathrm{e}}$ be its extension graph. We inductively define a sequence $\{\Gamma_i\}$ of finite induced subgraphs of $\Gamma^{\mathrm{e}}$ through successive applications of an operation called "doubling along a star". Then we show that every finite induced subgraph of $\Gamma^{\mathrm{e}}$ is isomorphic to an induced subgraph of some $\Gamma_i$. | math | 1 |
Title: Noncommutative Hamiltonian structures and quantizations on preprojective algebras
Abstract: Given a noncommutative Hamiltonian space $A$, we show that the conjecture ``{\it quantization commutes with reduction}'' holds on $A$. We also construct a semi-product algebra $A \rtimes \mG^A$, equivariant sheaves on the representation space are related to left $A \rtimes \mG^A$-modules. In the quiver setting, via the quantum and classical trace maps, we establish the explicit correspondence between quantizations on a preprojective algebra and those on a quiver variety. | math | 0 |
Title: Higher depth quantum modular forms and plumbed $3$-manifolds
Abstract: In this paper we study new invariants $\widehat{Z}_{\boldsymbol{a}}(q)$ attached to plumbed $3$-manifolds that were introduced by Gukov, Pei, Putrov, and Vafa. These remarkable $q$-series at radial limits conjecturally compute WRT invariants of the corresponding plumbed $3$-manifold. Here we investigate the series $\widehat{Z}_{0}(q)$ for unimodular plumbing ${\tt H}$-graphs with six vertices. We prove that for every positive definite unimodular plumbing matrix, $\widehat{Z}_{0}(q)$ is a depth two quantum modular form on $\mathbb{Q}$. | math | 1 |
Title: Persistent components in Canny's resultant
Abstract: When using resultants for elimination, one standard issue is that the resultant vanishes if the variety contains components of dimension larger than the expected dimension. J. Canny proposed an elegant construction, generalized characteristic polynomial, to address this issue by symbolically perturbing the system before the resultant computation. Such perturbed resultant would typically involve artefact components only loosely related to the geometry of the variety of interest. For removing these components, J.M. Rojas proposed to take the greatest common divisor of the results of two different perturbations. In this paper, we investigate this construction, and show that the extra components persistent under taking different perturbations must come either from singularities or from positive-dimensional fibers. | cs | 0 |
Title: Knowledge-based XAI through CBR: There is more to explanations than models can tell
Abstract: The underlying hypothesis of knowledge-based explainable artificial intelligence is the data required for data-centric artificial intelligence agents (e.g., neural networks) are less diverse in contents than the data required to explain the decisions of such agents to humans. The idea is that a classifier can attain high accuracy using data that express a phenomenon from one perspective whereas the audience of explanations can entail multiple stakeholders and span diverse perspectives. We hence propose to use domain knowledge to complement the data used by agents. We formulate knowledge-based explainable artificial intelligence as a supervised data classification problem aligned with the CBR methodology. In this formulation, the inputs are case problems composed of both the inputs and outputs of the data-centric agent and case solutions, the outputs, are explanation categories obtained from domain knowledge and subject matter experts. This formulation does not typically lead to an accurate classification, preventing the selection of the correct explanation category. Knowledge-based explainable artificial intelligence extends the data in this formulation by adding features aligned with domain knowledge that can increase accuracy when selecting explanation categories. | cs | 1 |
Title: On the maximal and minimal degree components of the cocenter of the cyclotomic KLR algebras
Abstract: Let $\mathscr{R}_\alpha^\Lambda$ be the cyclotomic KLR algebra associated to a symmetrizable Kac-Moody Lie algebra $\mathfrak{g}$ and polynomials $\{Q_{ij}(u,v)\}_{i,j\in I}$. Shan, Varagnolo and Vasserot show that, when the ground field $K$ has characteristic $0$, the degree $d$ component of the cocenter $Tr(\mathscr{R}_\alpha^\Lambda)$ is nonzero only if $0\leq d\leq d_{\Lambda,\alpha}$. In this paper we show that this holds true for arbitrary ground field $K$, arbitrary $\mathfrak{g}$ and arbitrary polynomials $\{Q_{ij}(u,v)\}_{i,j\in I}$. We generalize our earlier results on the $K$-linear generators of $Tr(\mathscr{R}_\alpha^\Lambda), Tr(\mathscr{R}_\alpha^\Lambda)_0, Tr(\mathscr{R}_\alpha^\Lambda)_{d_{\Lambda,\alpha}}$ to arbitrary ground field $K$. Moreover, we show that the dimension of the degree $0$ component $Tr(\mathscr{R}_\alpha^\Lambda)_0$ is always equal to $\dim V(\Lambda)_{\Lambda-\alpha}$, where $V(\Lambda)$ is the integrable highest weight $U(\mathfrak{g})$-module with highest weight $\Lambda$, and we obtain a basis for $Tr(\mathscr{R}_\alpha^\Lambda)_0$. | math | 0 |
Title: A network-level transport model of tau progression in the Alzheimer's brain
Abstract: One of the hallmarks of Alzheimer's disease (AD) is the accumulation and spread of toxic aggregates of tau protein. The progression of AD tau pathology is thought to be highly stereotyped, which is in part due to the fact that tau can spread between regions via the white matter tracts that connect them. Mathematically, this phenomenon has been described using models of "network diffusion", where the rate of spread of tau between brain regions is proportional to its concentration gradient and the amount of white matter between them. Although these models can robustly predict the progression of pathology in a wide variety of neurodegenerative diseases, including AD, an under explored aspect of tau spreading is that it is governed not simply by diffusion but also active transport along axonal microtubules. Spread can therefore take on a directional bias, resulting in distinct patterns of deposition, but current models struggle to capture this phenomenon. Recently, we have developed a mathematical model of the axonal transport of toxic tau proteins that takes into account the effects tau exerts on the molecular motors. Here we describe and implement a macroscopic version of this model, which we call the Network Transport Model (NTM). A key feature of this model is that, while it predicts tau dynamics at a regional level, it is parameterized in terms of only microscopic processes such as aggregation and transport rates; that is, differences in brain-wide tau progression can be explained by its microscopic properties. We provide numerical evidence that, as with the two-neuron model that the NTM extends, there are distinct and rich dynamics with respect to the overall rate of spread and the staging of pathology when we simulated the NTM on the hippocampal subnetwork. The theoretical insights provided by the NTM have broad implications for understanding AD pathophysiology more generally. | math | 0 |
Title: Equivariant $K$-theory of Springer Varieties
Abstract: The aim of this paper is to describe the topological equivariant $K$-ring, in terms of generators and relations, of a Springer variety $\mathcal{F}_{\lambda}$ of type $A$ associated to a nilpotent operator having Jordan canonical form whose block sizes form a weakly decreasing sequence $\lambda=(\lambda_1,\ldots, \lambda_l)$. This parallels the description of the equivariant cohomology ring of $\mathcal{F}_{\lambda}$ due to Abe and Horiguchi and generalizes the description of ordinary topological $K$-ring of $\mathcal{F}_{\lambda}$ due to Sankaran and Uma \cite{su}. | math | 0 |
Title: Variational Autoencoders Without the Variation
Abstract: Variational autoencdoers (VAE) are a popular approach to generative modelling. However, exploiting the capabilities of VAEs in practice can be difficult. Recent work on regularised and entropic autoencoders have begun to explore the potential, for generative modelling, of removing the variational approach and returning to the classic deterministic autoencoder (DAE) with additional novel regularisation methods. In this paper we empirically explore the capability of DAEs for image generation without additional novel methods and the effect of the implicit regularisation and smoothness of large networks. We find that DAEs can be used successfully for image generation without additional loss terms, and that many of the useful properties of VAEs can arise implicitly from sufficiently large convolutional encoders and decoders when trained on CIFAR-10 and CelebA. | cs | 1 |
Title: Partial classification of the large-time behavior of solutions to cubic nonlinear Schrödinger systems
Abstract: In this paper, we study the large-time behavior of small solutions to the standard form of the systems of 1D cubic nonlinear Schr\"odinger equations consisting of two components and possessing a coercive mass-like conserved quantity. The cubic nonlinearity is known to be critical in one space dimension in view of the large-time behavior. By employing the result by Katayama and Sakoda, one can obtain the large-time behavior of the solution if we can integrate the corresponding ODE system. We introduce an integration scheme suited to the system. The key idea is to rewrite the ODE system, which is cubic, as a quadratic system of quadratic quantities of the original unknown. By using this technique, we described the large-time behavior of solutions in terms of elementary functions and the Jacobi elliptic functions for several examples of standard systems. | math | 0 |
Title: Semiring Provenance for First-Order Model Checking
Abstract: Given a first-order sentence, a model-checking computation tests whether the sentence holds true in a given finite structure. Data provenance extracts from this computation an abstraction of the manner in which its result depends on the data items that describe the model. Previous work on provenance was, to a large extent, restricted to the negation-free fragment of first-order logic and showed how provenance abstractions can be usefully described as elements of commutative semirings --- most generally as multivariate polynomials with positive integer coefficients. In this paper we introduce a novel approach to dealing with negation and a corresponding commutative semiring of polynomials with dual indeterminates. These polynomials are used to perform reverse provenance analysis, i.e., finding models that satisfy various properties under given provenance tracking assumptions. | cs | 1 |
Title: On the connected (sub)partition polytope
Abstract: Let $k$ be a positive integer and let $G$ be a graph with $n$ vertices. A connected $k$-subpartition of $G$ is a collection of $k$ pairwise disjoint sets (a.k.a. classes) of vertices in $G$ such that each set induces a connected subgraph. The connected $k$-partition polytope of $G$, denoted by $P(G,k)$, is defined as the convex hull of the incidence vectors of all connected $k$-subpartitions of $G$. Many applications arising in off-shore oil-drilling, forest planning, image processing, cluster analysis, political districting, police patrolling, and biology are modeled in terms of finding connected (sub)partitions of a graph. This study focus on the facial structure of $P(G,k)$ and the computational complexity of the corresponding separation problems. We first propose a set of valid inequalities having non-null coefficients associated with a single class that extends and generalizes the ones in the literature of related problems, show sufficient conditions for these inequalities to be facet-defining, and design a polynomial-time separation algorithm for them. We also devise two sets of inequalities that consider multiple classes, prove when they define facets, and study the computational complexity of associated separation problems. | math | 0 |
Title: Non-Atomic Arbitrage in Decentralized Finance
Abstract: The prevalence of maximal extractable value (MEV) in the Ethereum ecosystem has led to a characterization of the latter as a dark forest. Studies of MEV have thus far largely been restricted to purely on-chain MEV, i.e., sandwich attacks, cyclic arbitrage, and liquidations. In this work, we shed light on the prevalence of non-atomic arbitrage on decentralized exchanges (DEXes) on the Ethereum blockchain. Importantly, non-atomic arbitrage exploits price differences between DEXes on the Ethereum blockchain as well as exchanges outside the Ethereum blockchain (i.e., centralized exchanges or DEXes on other blockchains). Thus, non-atomic arbitrage is a type of MEV that involves actions on and off the Ethereum blockchain. In our study of non-atomic arbitrage, we uncover that more than a fourth of the volume on Ethereum's biggest five DEXes from the merge until 31 October 2023 can likely be attributed to this type of MEV. We further highlight that only eleven searchers are responsible for more than 80% of the identified non-atomic arbitrage volume sitting at a staggering 137 billion US$ and draw a connection between the centralization of the block construction market and non-atomic arbitrage. Finally, we discuss the security implications of these high-value transactions that account for more than 10% of Ethereum's total block value and outline possible mitigations. | cs | 0 |
Title: Proven Distributed Memory Parallelization of Particle Methods
Abstract: We provide a mathematically proven parallelization scheme for particle methods on distributed-memory computer systems. Particle methods are a versatile and widely used class of algorithms for computer simulations and numerical predictions in various applications, ranging from continuum fluid dynamics and granular flows, using methods such as Smoothed Particle Hydrodynamics (SPH) and Discrete Element Methods (DEM) to Molecular Dynamics (MD) simulations in molecular modeling. Particle methods naturally lend themselves to implementation on parallel-computing hardware. So far, however, a mathematical proof of correctness and equivalence to sequential implementations was only available for shared-memory parallelism. Here, we leverage a formal definition of the algorithmic class of particle methods to provide a proven parallelization scheme for distributed-memory computers. We prove that these parallelized particle methods on distributed memory computers are formally equivalent to their sequential counterpart for a well-defined class of particle methods. Notably, the here analyzed parallelization scheme is well-known and commonly used. Our analysis is, therefore, of immediate practical relevance to existing and new parallel software implementations of particle methods and places them on solid theoretical grounds. | cs | 0 |
Title: Sequential choice functions and stability problems
Abstract: The concept of sequential choice functions is introduced and studied. This concept applies to the reduction of the problem of stable matchings with sequential workers to a situation where the workers are linear. | math | 0 |
Title: Physics-informed neural network for modeling dynamic linear elasticity
Abstract: In this work, we present the physics-informed neural network (PINN) model applied particularly to dynamic problems in solid mechanics. We focus on forward and inverse problems. Particularly, we show how a PINN model can be used efficiently for material identification in a dynamic setting. In this work, we assume linear continuum elasticity. We show results for two-dimensional (2D) plane strain problem and then we proceed to apply the same techniques for a three-dimensional (3D) problem. As for the training data we use the solution based on the finite element method. We rigorously show that PINN models are accurate, robust and computationally efficient, especially as a surrogate model for material identification problems. Also, we employ state-of-the-art techniques from the PINN literature which are an improvement to the vanilla implementation of PINN. Based on our results, we believe that the framework we have developed can be readily adapted to computational platforms for solving multiple dynamic problems in solid mechanics. | cs | 0 |
Title: Speed Partitioning for Indexing Moving Objects
Abstract: Indexing moving objects has been extensively studied in the past decades. Moving objects, such as vehicles and mobile device users, usually exhibit some patterns on their velocities, which can be utilized for velocity-based partitioning to improve performance of the indexes. Existing velocity-based partitioning techniques rely on some kinds of heuristics rather than analytically calculate the optimal solution. In this paper, we propose a novel speed partitioning technique based on a formal analysis over speed values of the moving objects. We first show that speed partitioning will significantly reduce the search space expansion which has direct impacts on query performance of the indexes. Next we formulate the optimal speed partitioning problem based on search space expansion analysis and then compute the optimal solution using dynamic programming. We then build the partitioned indexing system where queries are duplicated and processed in each index partition. Extensive experiments demonstrate that our method dramatically improves the performance of indexes for moving objects and outperforms other state-of-the-art velocity-based partitioning approaches. | cs | 1 |
Title: Ricci flows which terminate in cones
Abstract: We prove that a complete solution to the Ricci flow on $M\times [-T, 0)$ which has quadratic curvature decay on some end of $M$ and converges locally smoothly to the end of a cone on that neighborhood as $t\nearrow 0$ must be a gradient shrinking soliton. | math | 0 |
Title: Termination of Rewriting on Reversible Boolean Circuits as a Free 3-Category Problem
Abstract: Reversible Boolean Circuits are an interesting computational model under many aspects and in different fields, ranging from Reversible Computing to Quantum Computing. Our contribution is to describe a specific class of Reversible Boolean Circuits - which is as expressive as classical circuits - as a bi-dimensional diagrammatic programming language. We uniformly represent the Reversible Boolean Circuits we focus on as a free 3-category Toff. This formalism allows us to incorporate the representation of circuits and of rewriting rules on them, and to prove termination of rewriting. Termination follows from defining a non-identities-preserving functor from our free 3-category Toff into a suitable 3-category Move that traces the "moves" applied to wires inside circuits. | cs | 0 |
Title: Hierarchical Over-the-Air Federated Learning with Awareness of Interference and Data Heterogeneity
Abstract: When implementing hierarchical federated learning over wireless networks, scalability assurance and the ability to handle both interference and device data heterogeneity are crucial. This work introduces a learning method designed to address these challenges, along with a scalable transmission scheme that efficiently uses a single wireless resource through over-the-air computation. To provide resistance against data heterogeneity, we employ gradient aggregations. Meanwhile, the impact of interference is minimized through optimized receiver normalizing factors. For this, we model a multi-cluster wireless network using stochastic geometry, and characterize the mean squared error of the aggregation estimations as a function of the network parameters. We show that despite the interference and the data heterogeneity, the proposed scheme achieves high learning accuracy and can significantly outperform the conventional hierarchical algorithm. | cs | 0 |
Title: Multimodal Sampling via Approximate Symmetries
Abstract: Sampling from multimodal distributions is a challenging task in scientific computing. When a distribution has an exact symmetry between the modes, direct jumps among them can accelerate the samplings significantly. However, the distributions from most applications do not have exact symmetries. This paper considers the distributions with approximate symmetries. We first construct an exactly symmetric reference distribution from the target one by averaging over the group orbit associated with the approximate symmetry. Next, we can apply the multilevel Monte Carlo methods by constructing a continuation path between the reference and target distributions. We discuss how to implement these steps with annealed importance sampling and tempered transitions. Compared with traditional multilevel methods, the proposed approach can be more effective since the reference and target distributions are much closer. Numerical results of the Ising models are presented to illustrate the efficiency of the proposed method. | math | 0 |
Title: Mechanizing the Metatheory of LF
Abstract: LF is a dependent type theory in which many other formal systems can be conveniently embedded. However, correct use of LF relies on nontrivial metatheoretic developments such as proofs of correctness of decision procedures for LF's judgments. Although detailed informal proofs of these properties have been published, they have not been formally verified in a theorem prover. We have formalized these properties within Isabelle/HOL using the Nominal Datatype Package, closely following a recent article by Harper and Pfenning. In the process, we identified and resolved a gap in one of the proofs and a small number of minor lacunae in others. We also formally derive a version of the type checking algorithm from which Isabelle/HOL can generate executable code. Besides its intrinsic interest, our formalization provides a foundation for studying the adequacy of LF encodings, the correctness of Twelf-style metatheoretic reasoning, and the metatheory of extensions to LF. | cs | 1 |
Title: Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption
Abstract: We present new analytic techniques for inferring HTTP semantics from passive observations of HTTPS that can infer the value of important fields including the status-code, Content-Type, and Server, and the presence or absence of several additional HTTP header fields, e.g., Cookie and Referer. Our goals are twofold: to better understand the limitations of the confidentiality of HTTPS, and to explore benign uses of traffic analysis such as application troubleshooting and malware detection that could replace HTTPS interception and static private keys in some scenarios. We found that our techniques improve the efficacy of malware detection, but they do not enable more powerful website fingerprinting attacks against Tor. Our broader set of results raises concerns about the confidentiality goals of TLS relative to a user's expectation of privacy, warranting future research. We apply our methods to the semantics of both HTTP/1.1 and HTTP/2 on data collected from automated runs of Firefox 58.0, Chrome 63.0, and Tor Browser 7.0.11 in a lab setting, and from applications running in a malware sandbox. We obtain ground truth plaintext for a diverse set of applications from the malware sandbox by extracting the key material needed for decryption from RAM post-execution. We developed an iterative approach to simultaneously solve several multi-class (field values) and binary (field presence) classification problems, and we show that our inference algorithm achieves an unweighted $F_1$ score greater than 0.900 for most HTTP fields examined. | cs | 1 |
Title: 5-Engel Lie algebras
Abstract: We prove that 5-Engel Lie algebras over a field of characteristic zero, or over a field of prime characteristic $p>7$, are nilpotent of class at most 11. We also prove that if $G$ is a finite 5-Engel $p$-group for $p>7$ then $G$ is nilpotent of class at most 10. | math | 0 |
Title: Equidistribution from the Chinese Remainder Theorem
Abstract: We prove the equidistribution of subsets of $(\Rr/\Zz)^n$ defined by fractional parts of subsets of~$(\Zz/q\Zz)^n$ that are constructed using the Chinese Remainder Theorem. | math | 1 |
Title: A New Foundation for Finitary Corecursion
Abstract: This paper contributes to a theory of the behaviour of "finite-state" systems that is generic in the system type. We propose that such systems are modeled as coalgebras with a finitely generated carrier for an endofunctor on a locally finitely presentable category. Their behaviour gives rise to a new fixpoint of the coalgebraic type functor called locally finite fixpoint (LFF). We prove that if the given endofunctor preserves monomorphisms then the LFF always exists and is a subcoalgebra of the final coalgebra (unlike the rational fixpoint previously studied by Ad\'amek, Milius and Velebil). Moreover, we show that the LFF is characterized by two universal properties: 1. as the final locally finitely generated coalgebra, and 2. as the initial fg-iterative algebra. As instances of the LFF we first obtain the known instances of the rational fixpoint, e.g. regular languages, rational streams and formal power-series, regular trees etc. And we obtain a number of new examples, e.g. (realtime deterministic resp. non-deterministic) context-free languages, constructively S-algebraic formal power-series (and any other instance of the generalized powerset construction by Silva, Bonchi, Bonsangue, and Rutten) and the monad of Courcelle's algebraic trees. | math | 1 |
Title: On the completeness of root function system of the $2\times 2$ Dirac operators with non-regular boundary conditions
Abstract: The paper is concerned with the completeness property of root functions of the $2\times 2$ Dirac operator with summable complex-valued potential and non-regular boundary conditions. Sufficient conditions for the completeness of the root function system of the operator under consideration are established. | math | 0 |
Title: Evolutionary Alternating Direction Method of Multipliers for Constrained Multi-Objective Optimization with Unknown Constraints
Abstract: Constrained multi-objective optimization problems (CMOPs) pervade real-world applications in science, engineering, and design. Constraint violation has been a building block in designing evolutionary multi-objective optimization algorithms for solving constrained multi-objective optimization problems. However, in certain scenarios, constraint functions might be unknown or inadequately defined, making constraint violation unattainable and potentially misleading for conventional constrained evolutionary multi-objective optimization algorithms. To address this issue, we present the first of its kind evolutionary optimization framework, inspired by the principles of the alternating direction method of multipliers that decouples objective and constraint functions. This framework tackles CMOPs with unknown constraints by reformulating the original problem into an additive form of two subproblems, each of which is allotted a dedicated evolutionary population. Notably, these two populations operate towards complementary evolutionary directions during their optimization processes. In order to minimize discrepancy, their evolutionary directions alternate, aiding the discovery of feasible solutions. Comparative experiments conducted against five state-of-the-art constrained evolutionary multi-objective optimization algorithms, on 120 benchmark test problem instances with varying properties, as well as two real-world engineering optimization problems, demonstrate the effectiveness and superiority of our proposed framework. Its salient features include faster convergence and enhanced resilience to various Pareto front shapes. | cs | 0 |
Title: Asymptotic approximations of the continuous Hahn polynomials and their zeros
Abstract: Asymptotic approximations for the continuous Hahn polynomials and their zeros as the degree grows to infinity are established via their three-term recurrence relation. The methods are based on the uniform asymptotic expansions for difference equations developed by Wang and Wong (\textit{Numer. Math.}, 2003) and the matching technique in the complex plane developed by Wang (\textit{J. Approx. Theory}, 2014). | math | 1 |
Title: Unique equilibrium states for some intermediate beta transformations
Abstract: We prove uniqueness of equilibrium states for subshifts corresponding to intermediate beta transformations with $\beta > 2$ having the property that the orbit of 0 is bounded away from 1. | math | 1 |
Title: A quick probability-oriented introduction to operator splitting methods
Abstract: This paper is an extended and reworked version of a short course given by the author at ''Uzbekistan-Ukrainian readings in stochastic processes'', Tashkent-Kyiv, 2022, and was prepared for a special issue of ''Theory of stochastic processes'', devoted to publishing lecture notes from the aforementioned workshop. The survey is devoted to operator splitting methods in the abstract formulation and their applications in probability. While the survey is focused on multiplicative methods, the BCH formula is used to discuss exponential splitting methods and a short informal introduction to additive splitting is presented. We introduce frameworks and available deterministic and probabilistic results and concentrate on constructing a wide picture of the field of operator splitting methods, providing a rigorous description in the setting of abstract Cauchy problems and an informal discussion for further and parallel advances. Some limitations and common difficulties are listed, as well as examples of works that provide solutions or hints. No new results are given. The bibliography contains illustrative deterministic examples and a selection of probability-related works. | math | 0 |
Title: On Higher-Order Extensions of the Weighted Projection Body Operator
Abstract: For a convex body $K$ in $\mathbb{R}^n$, the inequalities of Rogers-Shephard and Zhang, written succinctly, are $\text{vol}_n(DK)\leq \binom{2n}{n} \text{vol}_n(K) \leq \text{vol}_n(n\text{vol}_n(K)\Pi^\circ K).$ Here, $DK=\{x\in\mathbb{R}^n:K\cap(K+x)\neq \emptyset\}$ is the difference body of $K$, and $\Pi^\circ K$ is the polar projection body of $K$. There is equality in either if, and only if, $K$ is a $n$-dimensional simplex. In fact, there exists a collection of convex bodies, the so-called radial mean bodies $R_p K$ introduced by Gardner and Zhang, which continuously interpolates between $DK$ and $\Pi^\circ K$. Schneider defined the higher-order difference body as, for $m\in\mathbb{N}$, $$D^m(K)=\{(x_1,\dots,x_m)\in\mathbb{R}^{nm}:K\cap_{i=1}^m(K+x_i)\neq \emptyset\}\subset \mathbb{R}^{nm}$$ and proved a higher-order version of the Rogers-Shephard inequality. In a prequel to this work, the authors, working with Haddad, extended the higher-order concept to the radial mean bodies and the polar projection body, establishing the associated Zhang-type inequality. In this work, we introduce weighted versions of the above-mentioned operators by replacing the Lebesgue measure with measures that have density. The weighted version of these operators in the $m=1$ case was first done by Roysdon (difference body), Langharst-Roysdon-Zvavitch (polar projection body) and Langharst-Putterman (radial mean bodies). This work can be seen as a sequel to all those works, generalizing them to the higher-order setting. In the last section, we extend many of these ideas to the setting of generalized volume, first introduced by Gardner-Hug-Weil-Xing-Ye. | math | 0 |
Title: Sheaves of Probability
Abstract: What does it mean for multiple agents' credence functions to be consistent with each other, if the agents have distinct but overlapping sets of evidence? Mathematical philosopher Michael Titelbaum's rule, called Generalized Conditionalization (GC), sensibly requires each pair of agents to acquire identical credences if they updated on each other's evidence. However, GC allows for paradoxical arrangements of agent credences that we would not like to call consistent. We interpret GC as a gluing condition in the context of sheaf theory, and show that if we further assume that the agents' evidence is logically consistent then the sheaf condition is satisfied and the paradoxes are resolved. | math | 0 |
Title: Casson towers and slice links
Abstract: We prove that a Casson tower of height 4 contains a flat embedded disc bounded by the attaching circle, and we prove disc embedding results for height 2 and 3 Casson towers which are embedded into a 4-manifold, with some additional fundamental group assumptions. In the proofs we create a capped grope from a Casson tower and use a refined height raising argument to establish the existence of a symmetric grope which has two layers of caps, data which is sufficient for a topological disc to exist, with the desired boundary. As applications, we present new slice knots and links by giving direct geometric constructions of slicing discs. In particular we construct a family of slice knots which are potential counterexamples to the homotopy ribbon slice conjecture. | math | 1 |