text
stringlengths
57
2.88k
labels
sequencelengths
6
6
Title: A New Perspective on Robust $M$-Estimation: Finite Sample Theory and Applications to Dependence-Adjusted Multiple Testing, Abstract: Heavy-tailed errors impair the accuracy of the least squares estimate, which can be spoiled by a single grossly outlying observation. As argued in the seminal work of Peter Huber in 1973 [{\it Ann. Statist.} {\bf 1} (1973) 799--821], robust alternatives to the method of least squares are sorely needed. To achieve robustness against heavy-tailed sampling distributions, we revisit the Huber estimator from a new perspective by letting the tuning parameter involved diverge with the sample size. In this paper, we develop nonasymptotic concentration results for such an adaptive Huber estimator, namely, the Huber estimator with the tuning parameter adapted to sample size, dimension, and the variance of the noise. Specifically, we obtain a sub-Gaussian-type deviation inequality and a nonasymptotic Bahadur representation when noise variables only have finite second moments. The nonasymptotic results further yield two conventional normal approximation results that are of independent interest, the Berry-Esseen inequality and Cramér-type moderate deviation. As an important application to large-scale simultaneous inference, we apply these robust normal approximation results to analyze a dependence-adjusted multiple testing procedure for moderately heavy-tailed data. It is shown that the robust dependence-adjusted procedure asymptotically controls the overall false discovery proportion at the nominal level under mild moment conditions. Thorough numerical results on both simulated and real datasets are also provided to back up our theory.
[ 0, 0, 1, 1, 0, 0 ]
Title: On the incorporation of interval-valued fuzzy sets into the Bousi-Prolog system: declarative semantics, implementation and applications, Abstract: In this paper we analyse the benefits of incorporating interval-valued fuzzy sets into the Bousi-Prolog system. A syntax, declarative semantics and im- plementation for this extension is presented and formalised. We show, by using potential applications, that fuzzy logic programming frameworks enhanced with them can correctly work together with lexical resources and ontologies in order to improve their capabilities for knowledge representation and reasoning.
[ 1, 0, 0, 0, 0, 0 ]
Title: Pandeia: A Multi-mission Exposure Time Calculator for JWST and WFIRST, Abstract: Pandeia is the exposure time calculator (ETC) system developed for the James Webb Space Telescope (JWST) that will be used for creating JWST proposals. It includes a simulation-hybrid Python engine that calculates the two-dimensional pixel-by-pixel signal and noise properties of the JWST instruments. This allows for appropriate handling of realistic point spread functions, MULTIACCUM detector readouts, correlated detector readnoise, and multiple photometric and spectral extraction strategies. Pandeia includes support for all the JWST observing modes, including imaging, slitted/slitless spectroscopy, integral field spectroscopy, and coronagraphy. Its highly modular, data-driven design makes it easily adaptable to other observatories. An implementation for use with WFIRST is also available.
[ 0, 1, 0, 0, 0, 0 ]
Title: Fitch-Style Modal Lambda Calculi, Abstract: Fitch-style modal deduction, in which modalities are eliminated by opening a subordinate proof, and introduced by shutting one, were investigated in the 1990s as a basis for lambda calculi. We show that such calculi have good computational properties for a variety of intuitionistic modal logics. Semantics are given in cartesian closed categories equipped with an adjunction of endofunctors, with the necessity modality interpreted by the right adjoint. Where this functor is an idempotent comonad, a coherence result on the semantics allows us to present a calculus for intuitionistic S4 that is simpler than others in the literature. We show the calculi can be extended à la tense logic with the left adjoint of necessity, and are then complete for the categorical semantics.
[ 1, 0, 0, 0, 0, 0 ]
Title: Asymptotic behaviour of ground states for mixtures of ferromagnetic and antiferromagnetic interactions in a dilute regime, Abstract: We consider randomly distributed mixtures of bonds of ferromagnetic and antiferromagnetic type in a two-dimensional square lattice with probability $1-p$ and $p$, respectively, according to an i.i.d. random variable. We study minimizers of the corresponding nearest-neighbour spin energy on large domains in ${\mathbb Z}^2$. We prove that there exists $p_0$ such that for $p\le p_0$ such minimizers are characterized by a majority phase; i.e., they take identically the value $1$ or $-1$ except for small disconnected sets. A deterministic analogue is also proved.
[ 0, 0, 1, 0, 0, 0 ]
Title: Extended Reduced-Form Framework for Non-Life Insurance, Abstract: In this paper we propose a general framework for modeling an insurance claims' information flow in continuous time, by generalizing the reduced-form framework for credit risk and life insurance. In particular, we assume a nontrivial dependence structure between the reference filtration and the insurance internal filtration. We apply these results for pricing non-life insurance liabilities in hybrid financial and insurance markets, while taking into account the role of inflation under the benchmark approach. This framework offers at the same time a general and flexible structure, and explicit and treatable pricing formula.
[ 0, 0, 0, 0, 0, 1 ]
Title: Overview of Recent Studies and Design Changes for the FNAL Magnetron Ion Source, Abstract: This paper will cover several studies and design changes that will eventually be implemented to the Fermi National Accelerator Laboratory (FNAL) magnetron ion source. The topics include tungsten cathode insert, solenoid gas valves, current controlled arc pulser, cesium boiler redesign, gas mixtures of hydrogen and nitrogen, and duty factor reduction. The studies were performed on the FNAL test stand, with the aim to improve source lifetime, stability, and reducing the amount of tuning needed.
[ 0, 1, 0, 0, 0, 0 ]
Title: Complete algebraic solution of multidimensional optimization problems in tropical semifield, Abstract: We consider multidimensional optimization problems that are formulated in the framework of tropical mathematics to minimize functions defined on vectors over a tropical semifield (a semiring with idempotent addition and invertible multiplication). The functions, given by a matrix and calculated through multiplicative conjugate transposition, are nonlinear in the tropical mathematics sense. We start with known results on the solution of the problems with irreducible matrices. To solve the problems in the case of arbitrary (reducible) matrices, we first derive the minimum value of the objective function, and find a set of solutions. We show that all solutions of the problem satisfy a system of vector inequalities, and then use these inequalities to establish characteristic properties of the solution set. Furthermore, all solutions of the problem are represented as a family of subsets, each defined by a matrix that is obtained by using a matrix sparsification technique. We describe a backtracking procedure that allows one to reduce the brute-force generation of sparsified matrices by skipping those, which cannot provide solutions, and thus offers an economical way to obtain all subsets in the family. Finally, the characteristic properties of the solution set are used to provide complete solutions in a closed form. We illustrate the results obtained with simple numerical examples.
[ 1, 0, 1, 0, 0, 0 ]
Title: Continuous Optimization of Adaptive Quadtree Structures, Abstract: We present a novel continuous optimization method to the discrete problem of quadtree optimization. The optimization aims at achieving a quadtree structure with the highest mechanical stiffness, where the edges in the quadtree are interpreted as structural elements carrying mechanical loads. We formulate quadtree optimization as a continuous material distribution problem. The discrete design variables (i.e., to refine or not to refine) are replaced by continuous variables on multiple levels in the quadtree hierarchy. In discrete quadtree optimization, a cell is only eligible for refinement if its parent cell has been refined. We propose a continuous analogue to this dependency for continuous multi-level design variables, and integrate it in the iterative optimization process. Our results show that the continuously optimized quadtree structures perform much stiffer than uniform patterns and the heuristically optimized counterparts. We demonstrate the use of adaptive structures as lightweight infill for 3D printed parts, where uniform geometric patterns have been typically used in practice.
[ 1, 0, 0, 0, 0, 0 ]
Title: Machine Learning Meets Microeconomics: The Case of Decision Trees and Discrete Choice, Abstract: We provide a microeconomic framework for decision trees: a popular machine learning method. Specifically, we show how decision trees represent a non-compensatory decision protocol known as disjunctions-of-conjunctions and how this protocol generalizes many of the non-compensatory rules used in the discrete choice literature so far. Additionally, we show how existing decision tree variants address many economic concerns that choice modelers might have. Beyond theoretical interpretations, we contribute to the existing literature of two-stage, semi-compensatory modeling and to the existing decision tree literature. In particular, we formulate the first bayesian model tree, thereby allowing for uncertainty in the estimated non-compensatory rules as well as for context-dependent preference heterogeneity in one's second-stage choice model. Using an application of bicycle mode choice in the San Francisco Bay Area, we estimate our bayesian model tree, and we find that it is over 1,000 times more likely to be closer to the true data-generating process than a multinomial logit model (MNL). Qualitatively, our bayesian model tree automatically finds the effect of bicycle infrastructure investment to be moderated by travel distance, socio-demographics and topography, and our model identifies diminishing returns from bike lane investments. These qualitative differences lead to bayesian model tree forecasts that directly align with the observed bicycle mode shares in regions with abundant bicycle infrastructure such as Davis, CA and the Netherlands. In comparison, MNL's forecasts are overly optimistic.
[ 0, 0, 0, 1, 0, 0 ]
Title: PAC Identification of Many Good Arms in Stochastic Multi-Armed Bandits, Abstract: We consider the problem of identifying any $k$ out of the best $m$ arms in an $n$-armed stochastic multi-armed bandit. Framed in the PAC setting, this particular problem generalises both the problem of `best subset selection' and that of selecting `one out of the best m' arms [arcsk 2017]. In applications such as crowd-sourcing and drug-designing, identifying a single good solution is often not sufficient. Moreover, finding the best subset might be hard due to the presence of many indistinguishably close solutions. Our generalisation of identifying exactly $k$ arms out of the best $m$, where $1 \leq k \leq m$, serves as a more effective alternative. We present a lower bound on the worst-case sample complexity for general $k$, and a fully sequential PAC algorithm, \GLUCB, which is more sample-efficient on easy instances. Also, extending our analysis to infinite-armed bandits, we present a PAC algorithm that is independent of $n$, which identifies an arm from the best $\rho$ fraction of arms using at most an additive poly-log number of samples than compared to the lower bound, thereby improving over [arcsk 2017] and [Aziz+AKA:2018]. The problem of identifying $k > 1$ distinct arms from the best $\rho$ fraction is not always well-defined; for a special class of this problem, we present lower and upper bounds. Finally, through a reduction, we establish a relation between upper bounds for the `one out of the best $\rho$' problem for infinite instances and the `one out of the best $m$' problem for finite instances. We conjecture that it is more efficient to solve `small' finite instances using the latter formulation, rather than going through the former.
[ 1, 0, 0, 1, 0, 0 ]
Title: Stein's Method for Stationary Distributions of Markov Chains and Application to Ising Models, Abstract: We develop a new technique, based on Stein's method, for comparing two stationary distributions of irreducible Markov Chains whose update rules are `close enough'. We apply this technique to compare Ising models on $d$-regular expander graphs to the Curie-Weiss model (complete graph) in terms of pairwise correlations and more generally $k$th order moments. Concretely, we show that $d$-regular Ramanujan graphs approximate the $k$th order moments of the Curie-Weiss model to within average error $k/\sqrt{d}$ (averaged over the size $k$ subsets). The result applies even in the low-temperature regime; we also derive some simpler approximation results for functionals of Ising models that hold only at high enough temperatures.
[ 0, 0, 1, 0, 0, 0 ]
Title: Enabling Multi-Source Neural Machine Translation By Concatenating Source Sentences In Multiple Languages, Abstract: In this paper, we propose a novel and elegant solution to "Multi-Source Neural Machine Translation" (MSNMT) which only relies on preprocessing a N-way multilingual corpus without modifying the Neural Machine Translation (NMT) architecture or training procedure. We simply concatenate the source sentences to form a single long multi-source input sentence while keeping the target side sentence as it is and train an NMT system using this preprocessed corpus. We evaluate our method in resource poor as well as resource rich settings and show its effectiveness (up to 4 BLEU using 2 source languages and up to 6 BLEU using 5 source languages) by comparing against existing methods for MSNMT. We also provide some insights on how the NMT system leverages multilingual information in such a scenario by visualizing attention.
[ 1, 0, 0, 0, 0, 0 ]
Title: Model-based reinforcement learning in differential graphical games, Abstract: This paper seeks to combine differential game theory with the actor-critic-identifier architecture to determine forward-in-time, approximate optimal controllers for formation tracking in multi-agent systems, where the agents have uncertain heterogeneous nonlinear dynamics. A continuous control strategy is proposed, using communication feedback from extended neighbors on a communication topology that has a spanning tree. A model-based reinforcement learning technique is developed to cooperatively control a group of agents to track a trajectory in a desired formation. Simulation results are presented to demonstrate the performance of the developed technique.
[ 1, 0, 1, 0, 0, 0 ]
Title: Approximation of solutions of SDEs driven by a fractional Brownian motion, under pathwise uniqueness, Abstract: Our aim in this paper is to establish some strong stability properties of a solution of a stochastic differential equation driven by a fractional Brownian motion for which the pathwise uniqueness holds. The results are obtained using Skorokhod's selection theorem.
[ 0, 0, 1, 0, 0, 0 ]
Title: Multi-district preference modelling, Abstract: Generating realistic artificial preference distributions is an important part of any simulation analysis of electoral systems. While this has been discussed in some detail in the context of a single electoral district, many electoral systems of interest are based on multiple districts. Neither treating preferences between districts as independent nor ignoring the district structure yields satisfactory results. We present a model based on an extension of the classic Eggenberger-Pólya urn, in which each district is represented by an urn and there is correlation between urns. We show in detail that this procedure has a small number of tunable parameters, is computationally efficient, and produces "realistic-looking" distributions. We intend to use it in further studies of electoral systems.
[ 1, 1, 0, 0, 0, 0 ]
Title: Neural Text Generation: A Practical Guide, Abstract: Deep learning methods have recently achieved great empirical success on machine translation, dialogue response generation, summarization, and other text generation tasks. At a high level, the technique has been to train end-to-end neural network models consisting of an encoder model to produce a hidden representation of the source text, followed by a decoder model to generate the target. While such models have significantly fewer pieces than earlier systems, significant tuning is still required to achieve good performance. For text generation models in particular, the decoder can behave in undesired ways, such as by generating truncated or repetitive outputs, outputting bland and generic responses, or in some cases producing ungrammatical gibberish. This paper is intended as a practical guide for resolving such undesired behavior in text generation models, with the aim of helping enable real-world applications.
[ 1, 0, 0, 1, 0, 0 ]
Title: On the Erasure Robustness Property of Random Matrices, Abstract: The study of the restricted isometry property (RIP) for corrupted random matrices is particularly important in the field of compressed sensing (CS) with corruptions. If a matrix still satisfy RIP after a certain portion of rows are erased, then we say that the matrix has the strong restricted isometry property (SRIP. In the field of compressed sensing, random matrices satisfies certain moment conditions are of particular interest. Among these matrices, those with entries generated from i.i.d Gaussian or i.i.d $\pm1$ random variables are often typically considered. Recent studies have shown that a matrix generated from i.i.d Gaussian random variables satisfies the strong restricted isometry property under arbitrary erasure of rows. In the first part of this paper we will work on $\pm 1$ random matrices. We study the erasure robustness of $\pm 1$ random matrices show that with overwhelming probability the SRIP will still hold. Moreover the analysis will also lead to the robust version of the Johnson-Lindenstrauss Lemma for $\pm 1$ matrices. Then in the second part of this paper we work on finite frames. The study of the stability of finite frames under corruptions shares a lot of similarity to CS with corruption. We will focus on the Gaussian finite frames as a starter. We will improve existing results and confirm that a Gaussian random frame is numerically stable under arbitrary erasure of rows.
[ 0, 0, 1, 0, 0, 0 ]
Title: Synchronizing automata and the language of minimal reset words, Abstract: We study a connection between synchronizing automata and its set $M$ of minimal reset words, i.e., such that no proper factor is a reset word. We first show that any synchronizing automaton having the set of minimal reset words whose set of factors does not contain a word of length at most $\frac{1}{4}\min\{|u|: u\in I\}+\frac{1}{16}$ has a reset word of length at most $(n-\frac{1}{2})^{2}$ In the last part of the paper we focus on the existence of synchronizing automata with a given ideal $I$ that serves as the set of reset words. To this end, we introduce the notion of the tail structure of the (not necessarily regular) ideal $I=\Sigma^{*}M\Sigma^{*}$. With this tool, we first show the existence of an infinite strongly connected synchronizing automaton $\mathcal{A}$ having $I$ as the set of reset words and such that every other strongly connected synchronizing automaton having $I$ as the set of reset words is an homomorphic image of $\mathcal{A}$. Finally, we show that for any non-unary regular ideal $I$ there is a strongly connected synchronizing automaton having $I$ as the set of reset words with at most $(km^{k})2^{km^{k}n}$ states, where $k=|\Sigma|$, $m$ is the length of a shortest word in $M$, and $n$ is the dimension of the smallest automaton recognizing $M$ (state complexity of $M$). This automaton is computable and we show an algorithm to compute it in time $\mathcal{O}((k^{2}m^{k})2^{km^{k}n})$.
[ 1, 0, 0, 0, 0, 0 ]
Title: Peephole: Predicting Network Performance Before Training, Abstract: The quest for performant networks has been a significant force that drives the advancements of deep learning in recent years. While rewarding, improving network design has never been an easy journey. The large design space combined with the tremendous cost required for network training poses a major obstacle to this endeavor. In this work, we propose a new approach to this problem, namely, predicting the performance of a network before training, based on its architecture. Specifically, we develop a unified way to encode individual layers into vectors and bring them together to form an integrated description via LSTM. Taking advantage of the recurrent network's strong expressive power, this method can reliably predict the performances of various network architectures. Our empirical studies showed that it not only achieved accurate predictions but also produced consistent rankings across datasets -- a key desideratum in performance prediction.
[ 1, 0, 0, 1, 0, 0 ]
Title: Quadratically Tight Relations for Randomized Query Complexity, Abstract: Let $f:\{0,1\}^n \rightarrow \{0,1\}$ be a Boolean function. The certificate complexity $C(f)$ is a complexity measure that is quadratically tight for the zero-error randomized query complexity $R_0(f)$: $C(f) \leq R_0(f) \leq C(f)^2$. In this paper we study a new complexity measure that we call expectational certificate complexity $EC(f)$, which is also a quadratically tight bound on $R_0(f)$: $EC(f) \leq R_0(f) = O(EC(f)^2)$. We prove that $EC(f) \leq C(f) \leq EC(f)^2$ and show that there is a quadratic separation between the two, thus $EC(f)$ gives a tighter upper bound for $R_0(f)$. The measure is also related to the fractional certificate complexity $FC(f)$ as follows: $FC(f) \leq EC(f) = O(FC(f)^{3/2})$. This also connects to an open question by Aaronson whether $FC(f)$ is a quadratically tight bound for $R_0(f)$, as $EC(f)$ is in fact a relaxation of $FC(f)$. In the second part of the work, we upper bound the distributed query complexity $D^\mu_\epsilon(f)$ for product distributions $\mu$ by the square of the query corruption bound ($\mathrm{corr}_\epsilon(f)$) which improves upon a result of Harsha, Jain and Radhakrishnan [2015]. A similar statement for communication complexity is open.
[ 1, 0, 0, 0, 0, 0 ]
Title: Parabolic subgroup orbits on finite root systems, Abstract: Oshima's Lemma describes the orbits of parabolic subgroups of irreducible finite Weyl groups on crystallographic root systems. This note generalises that result to all root systems of finite Coxeter groups, and provides a self contained proof, independent of the representation theory of semisimple complex Lie algebras.
[ 0, 0, 1, 0, 0, 0 ]
Title: User Modelling for Avoiding Overfitting in Interactive Knowledge Elicitation for Prediction, Abstract: In human-in-the-loop machine learning, the user provides information beyond that in the training data. Many algorithms and user interfaces have been designed to optimize and facilitate this human--machine interaction; however, fewer studies have addressed the potential defects the designs can cause. Effective interaction often requires exposing the user to the training data or its statistics. The design of the system is then critical, as this can lead to double use of data and overfitting, if the user reinforces noisy patterns in the data. We propose a user modelling methodology, by assuming simple rational behaviour, to correct the problem. We show, in a user study with 48 participants, that the method improves predictive performance in a sparse linear regression sentiment analysis task, where graded user knowledge on feature relevance is elicited. We believe that the key idea of inferring user knowledge with probabilistic user models has general applicability in guarding against overfitting and improving interactive machine learning.
[ 1, 0, 0, 1, 0, 0 ]
Title: Advanced Bayesian Multilevel Modeling with the R Package brms, Abstract: The brms package allows R users to easily specify a wide range of Bayesian single-level and multilevel models, which are fitted with the probabilistic programming language Stan behind the scenes. Several response distributions are supported, of which all parameters (e.g., location, scale, and shape) can be predicted at the same time thus allowing for distributional regression. Non-linear relationships may be specified using non-linear predictor terms or semi-parametric approaches such as splines or Gaussian processes. To make all of these modeling options possible in a multilevel framework, brms provides an intuitive and powerful formula syntax, which extends the well known formula syntax of lme4. The purpose of the present paper is to introduce this syntax in detail and to demonstrate its usefulness with four examples, each showing other relevant aspects of the syntax.
[ 0, 0, 0, 1, 0, 0 ]
Title: $W$-entropy, super Perelman Ricci flows and $(K, m)$-Ricci solitons, Abstract: In this paper, we prove the characterization of the $(K, \infty)$-super Perelman Ricci flows by various functional inequalities and gradient estimate for the heat semigroup generated by the Witten Laplacian on manifolds equipped with time dependent metrics and potentials. As a byproduct, we derive the Hamilton type dimension free Harnack inequality on manifolds with $(K, \infty)$-super Perelman Ricci flows. Based on a new second order differential inequality on the Boltzmann-Shannon entropy for the heat equation of the Witten Laplacian, we introduce a new $W$-entropy quantity and prove its monotonicity for the heat equation of the Witten Laplacian on complete Riemannian manifolds with the $CD(K, \infty)$-condition and on compact manifolds with $(K, \infty)$-super Perelman Ricci flows. Our results characterize the $(K, \infty)$-Ricci solitons and the $(K, \infty)$-Perelman Ricci flows. We also prove a second order differential entropy inequality on $(K, m)$-super Ricci flows, which can be used to characterize the $(K, m)$-Ricci solitons and the $(K, m)$-Ricci flows. Finally, we give a probabilistic interpretation of the $W$-entropy for the heat equation of the Witten Laplacian on manifolds with the $CD(K, m)$-condition.
[ 0, 0, 1, 0, 0, 0 ]
Title: Stellar energetic particle ionization in protoplanetary disks around T Tauri stars, Abstract: Anomalies in the abundance measurements of short lived radionuclides in meteorites indicate that the protosolar nebulae was irradiated by a high amount of energetic particles (E$\gtrsim$10 MeV). The particle flux of the contemporary Sun cannot explain these anomalies. However, similar to T Tauri stars the young Sun was more active and probably produced enough high energy particles to explain those anomalies. We want to study the interaction of stellar energetic particles with the gas component of the disk and identify possible observational tracers of this interaction. We use a 2D radiation thermo-chemical protoplanetary disk code to model a disk representative for T Tauri stars. We use a particle energy distribution derived from solar flare observations and an enhanced stellar particle flux proposed for T Tauri stars. For this particle spectrum we calculate the stellar particle ionization rate throughout the disk with an accurate particle transport model. We study the impact of stellar particles for models with varying X-ray and cosmic-ray ionization rates. We find that stellar particle ionization has a significant impact on the abundances of the common disk ionization tracers HCO$^+$ and N$_2$H$^+$, especially in models with low cosmic-ray ionization rates. In contrast to cosmic rays and X-rays, stellar particles cannot reach the midplane of the disk. Therefore molecular ions residing in the disk surface layers are more affected by stellar particle ionization than molecular ions tracing the cold layers/midplane of the disk. Spatially resolved observations of molecular ions tracing different vertical layers of the disk allow to disentangle the contribution of stellar particle ionization from other competing ionization sources. Modeling such observations with a model like the one presented here allows to constrain the stellar particle flux in disks around T Tauri stars.
[ 0, 1, 0, 0, 0, 0 ]
Title: Truncation-free Hybrid Inference for DPMM, Abstract: Dirichlet process mixture models (DPMM) are a cornerstone of Bayesian non-parametrics. While these models free from choosing the number of components a-priori, computationally attractive variational inference often reintroduces the need to do so, via a truncation on the variational distribution. In this paper we present a truncation-free hybrid inference for DPMM, combining the advantages of sampling-based MCMC and variational methods. The proposed hybridization enables more efficient variational updates, while increasing model complexity only if needed. We evaluate the properties of the hybrid updates and their empirical performance in single- as well as mixed-membership models. Our method is easy to implement and performs favorably compared to existing schemas.
[ 1, 0, 0, 1, 0, 0 ]
Title: Functors and morphisms determined by subcategories, Abstract: We study the existence and uniqueness of minimal right determiners in various categories. Particularly in a Hom-finite hereditary abelian category with enough projectives, we prove that the Auslander-Reiten-Smal{\o}-Ringel formula of the minimal right determiner still holds. As an application, we give a formula of minimal right determiners in the category of finitely presented representations of strongly locally finite quivers.
[ 0, 0, 1, 0, 0, 0 ]
Title: The Risk of Machine Learning, Abstract: Many applied settings in empirical economics involve simultaneous estimation of a large number of parameters. In particular, applied economists are often interested in estimating the effects of many-valued treatments (like teacher effects or location effects), treatment effects for many groups, and prediction models with many regressors. In these settings, machine learning methods that combine regularized estimation and data-driven choices of regularization parameters are useful to avoid over-fitting. In this article, we analyze the performance of a class of machine learning estimators that includes ridge, lasso and pretest in contexts that require simultaneous estimation of many parameters. Our analysis aims to provide guidance to applied researchers on (i) the choice between regularized estimators in practice and (ii) data-driven selection of regularization parameters. To address (i), we characterize the risk (mean squared error) of regularized estimators and derive their relative performance as a function of simple features of the data generating process. To address (ii), we show that data-driven choices of regularization parameters, based on Stein's unbiased risk estimate or on cross-validation, yield estimators with risk uniformly close to the risk attained under the optimal (unfeasible) choice of regularization parameters. We use data from recent examples in the empirical economics literature to illustrate the practical applicability of our results.
[ 0, 0, 0, 1, 0, 0 ]
Title: Agatha: disentangling periodic signals from correlated noise in a periodogram framework, Abstract: Periodograms are used as a key significance assessment and visualisation tool to display the significant periodicities in unevenly sampled time series. We introduce a framework of periodograms, called "Agatha", to disentangle periodic signals from correlated noise and to solve the 2-dimensional model selection problem: signal dimension and noise model dimension. These periodograms are calculated by applying likelihood maximization and marginalization and combined in a self-consistent way. We compare Agatha with other periodograms for the detection of Keplerian signals in synthetic radial velocity data produced for the Radial Velocity Challenge as well as in radial velocity datasets of several Sun-like stars. In our tests we find Agatha is able to recover signals to the adopted detection limit of the radial velocity challenge. Applied to real radial velocity, we use Agatha to confirm previous analysis of CoRoT-7 and to find two new planet candidates with minimum masses of 15.1 $M_\oplus$ and 7.08 $M_\oplus$ orbiting HD177565 and HD41248, with periods of 44.5 d and 13.4 d, respectively. We find that Agatha outperforms other periodograms in terms of removing correlated noise and assessing the significances of signals with more robust metrics. Moreover, it can be used to select the optimal noise model and to test the consistency of signals in time. Agatha is intended to be flexible enough to be applied to time series analyses in other astronomical and scientific disciplines. Agatha is available at this http URL.
[ 0, 1, 0, 1, 0, 0 ]
Title: On the generation of the quarks through spontaneous symmetry breaking, Abstract: In this paper we present the state of the art about the quarks: group SU(3), Lie algebra, the electric charge and mass. The quarks masses are generated in the same way as the lepton masses. It is constructed a term in the Lagrangian that couples the Higgs doublet to the fermion fields.
[ 0, 1, 0, 0, 0, 0 ]
Title: Distributed Holistic Clustering on Linked Data, Abstract: Link discovery is an active field of research to support data integration in the Web of Data. Due to the huge size and number of available data sources, efficient and effective link discovery is a very challenging task. Common pairwise link discovery approaches do not scale to many sources with very large entity sets. We here propose a distributed holistic approach to link many data sources based on a clustering of entities that represent the same real-world object. Our clustering approach provides a compact and fused representation of entities, and can identify errors in existing links as well as many new links. We support a distributed execution of the clustering approach to achieve faster execution times and scalability for large real-world data sets. We provide a novel gold standard for multi-source clustering, and evaluate our methods with respect to effectiveness and efficiency for large data sets from the geographic and music domains.
[ 1, 0, 0, 0, 0, 0 ]
Title: A branch-and-bound algorithm for the minimum radius $k$-enclosing ball problem, Abstract: The minimum $k$-enclosing ball problem seeks the ball with smallest radius that contains at least~$k$ of~$m$ given points in a general $n$-dimensional Euclidean space. This problem is NP-hard. We present a branch-and-bound algorithm on the tree of the subsets of~$k$ points to solve this problem. The nodes on the tree are ordered in a suitable way, which, complemented with a last-in-first-out search strategy, allows for only a small fraction of nodes to be explored. Additionally, an efficient dual algorithm to solve the subproblems at each node is employed.
[ 1, 0, 1, 0, 0, 0 ]
Title: Motion Planning in Irreducible Path Spaces, Abstract: The motion of a mechanical system can be defined as a path through its configuration space. Computing such a path has a computational complexity scaling exponentially with the dimensionality of the configuration space. We propose to reduce the dimensionality of the configuration space by introducing the irreducible path --- a path having a minimal swept volume. The paper consists of three parts: In part I, we define the space of all irreducible paths and show that planning a path in the irreducible path space preserves completeness of any motion planning algorithm. In part II, we construct an approximation to the irreducible path space of a serial kinematic chain under certain assumptions. In part III, we conduct motion planning using the irreducible path space for a mechanical snake in a turbine environment, for a mechanical octopus with eight arms in a pipe system and for the sideways motion of a humanoid robot moving through a room with doors and through a hole in a wall. We demonstrate that the concept of an irreducible path can be applied to any motion planning algorithm taking curvature constraints into account.
[ 1, 0, 0, 0, 0, 0 ]
Title: Sample-Derived Disjunctive Rules for Secure Power System Operation, Abstract: Machine learning techniques have been used in the past using Monte Carlo samples to construct predictors of the dynamic stability of power systems. In this paper we move beyond the task of prediction and propose a comprehensive approach to use predictors, such as Decision Trees (DT), within a standard optimization framework for pre- and post-fault control purposes. In particular, we present a generalizable method for embedding rules derived from DTs in an operation decision-making model. We begin by pointing out the specific challenges entailed when moving from a prediction to a control framework. We proceed with introducing the solution strategy based on generalized disjunctive programming (GDP) as well as a two-step search method for identifying optimal hyper-parameters for balancing cost and control accuracy. We showcase how the proposed approach constructs security proxies that cover multiple contingencies while facing high-dimensional uncertainty with respect to operating conditions with the use of a case study on the IEEE 39-bus system. The method is shown to achieve efficient system control at a marginal increase in system price compared to an oracle model.
[ 0, 0, 0, 1, 0, 0 ]
Title: Zeeman interaction and Jahn-Teller effect in $Γ_8$ multiplet, Abstract: We present a thorough analysis of the interplay of magnetic moment and the Jahn-Teller effect in the $\Gamma_8$ cubic multiplet. We find that in the presence of dynamical Jahn-Teller effect, the Zeeman interaction remains isotropic, whereas the $g$ and $G$ factors can change their signs. The static Jahn-Teller distortion also can change the sign of these $g$ factors as well as the nature of the magnetic anisotropy. Combining the theory with state-of-the-art {\it ab initio} calculations, we analyzed the magnetic properties of Np$^{4+}$ and Ir$^{4+}$ impurity ions in cubic environment. The calculated $g$ factors of Np$^{4+}$ impurity agree well with experimental data. The {\it ab initio} calculation predicts strong Jahn-Teller effect in Ir$^{4+}$ ion in cubic environment and the strong vibronic reduction of $g$ and $G$ factors.
[ 0, 1, 0, 0, 0, 0 ]
Title: The Design and Implementation of Modern Online Programming Competitions, Abstract: This paper presents a framework for the implementation of online programming competitions, including a set of principles for the design of the multiplayer game and a practical framework for the construction of the competition environment. The paper presents a successful example competition, the 2016-17 Halite challenge, and briefly mentions a second competition, the Halite II challenge, which launched in October 2017.
[ 1, 0, 0, 0, 0, 0 ]
Title: Emergence of a spectral gap in a class of random matrices associated with split graphs, Abstract: Motivated by the intriguing behavior displayed in a dynamic network that models a population of extreme introverts and extroverts (XIE), we consider the spectral properties of ensembles of random split graph adjacency matrices. We discover that, in general, a gap emerges in the bulk spectrum between -1 and 0 that contains a single eigenvalue. An analytic expression for the bulk distribution is derived and verified with numerical analysis. We also examine their relation to chiral ensembles, which are associated with bipartite graphs.
[ 0, 1, 1, 0, 0, 0 ]
Title: ParaGraphE: A Library for Parallel Knowledge Graph Embedding, Abstract: Knowledge graph embedding aims at translating the knowledge graph into numerical representations by transforming the entities and relations into continuous low-dimensional vectors. Recently, many methods [1, 5, 3, 2, 6] have been proposed to deal with this problem, but existing single-thread implementations of them are time-consuming for large-scale knowledge graphs. Here, we design a unified parallel framework to parallelize these methods, which achieves a significant time reduction without influencing the accuracy. We name our framework as ParaGraphE, which provides a library for parallel knowledge graph embedding. The source code can be downloaded from this https URL .
[ 1, 0, 0, 0, 0, 0 ]
Title: Platooning in the Presence of a Speed Drop: A Generalized Control Model, Abstract: The positive impacts of platooning on travel time reliability, congestion, emissions, and energy consumption have been shown for homogeneous roadway segments. However, speed limit changes frequently throughout the transportation network, due to either safety-related considerations (e.g., workzone operations) or congestion management schemes (e.g., speed harmonization systems). These abrupt changes in speed limit can result in shock- wave formation and cause travel time unreliability. Therefore, designing a platooning strategy for tracking a reference velocity profile is critical to enabling end-to-end platooning. Accordingly, this study introduces a generalized control model to track a desired velocity profile, while ensuring safety in the platoon of autonomous vehicles. We define appropriate natural error terms and the target curve in the state space of the control system, which is the set of points where all error terms vanish and corresponds to the case when all vehicles move with the desired velocities and in the minimum safe distance between them. In this way, we change the tracking velocity profile problem into a state- feedback stabilization problem with respect to the target curve. Under certain mild assumptions on the Lipschitz constant of the speed drop profile, we show that the stabilizing feedback can be obtained via introducing a natural dynamics for the maximum of the error terms for each vehicle. Moreover, we show that with this stabilizing feedback collisions will not occur if the initial state of the system of vehicles is sufficiently close to the target curve. We also show that the error terms remain bounded throughout the time and space. Two scenarios were simulated, with and without initial perturbations, and results confirmed the effectiveness of the proposed control model in tracking the speed drop while ensuring safety and string stability.
[ 1, 0, 0, 0, 0, 0 ]
Title: Direct visualization of vortex ice in a nanostructured superconductor, Abstract: Artificial ice systems have unique physical properties promising for potential applications. One of the most challenging issues in this field is to find novel ice systems that allows a precise control over the geometries and many-body interactions. Superconducting vortex matter has been proposed as a very suitable candidate to study artificial ice, mainly due to availability of tunable vortex-vortex interactions and the possibility to fabricate a variety of nanoscale pinning potential geometries. So far, a detailed imaging of the local configurations in a vortex-based artificial ice system is still lacking. Here we present a direct visualization of the vortex ice state in a nanostructured superconductor. By using the scanning Hall probe microscopy, a large area with the vortex ice ground state configuration has been detected, which confirms the recent theoretical predictions for this new ice system. Besides the defects analogous to artificial spin ice systems, other types of defects have been visualized and identified. We also demonstrate the possibility to realize different types of defects by varying the magnetic field.
[ 0, 1, 0, 0, 0, 0 ]
Title: Statistical Mechanics of Node-perturbation Learning with Noisy Baseline, Abstract: Node-perturbation learning is a type of statistical gradient descent algorithm that can be applied to problems where the objective function is not explicitly formulated, including reinforcement learning. It estimates the gradient of an objective function by using the change in the object function in response to the perturbation. The value of the objective function for an unperturbed output is called a baseline. Cho et al. proposed node-perturbation learning with a noisy baseline. In this paper, we report on building the statistical mechanics of Cho's model and on deriving coupled differential equations of order parameters that depict learning dynamics. We also show how to derive the generalization error by solving the differential equations of order parameters. On the basis of the results, we show that Cho's results are also apply in general cases and show some general performances of Cho's model.
[ 1, 0, 0, 1, 0, 0 ]
Title: New Generalized Fixed Point Results on $S_{b}$-Metric Spaces, Abstract: Recently $S_{b}$-metric spaces have been introduced as the generalizations of metric and $S$-metric spaces. In this paper we investigate some basic properties of this new space. We generalize the classical Banach's contraction principle using the theory of a complete $S_{b}$-metric space. Also we give an application to linear equation systems using the $S_{b}$-metric which is generated by a metric.
[ 0, 0, 1, 0, 0, 0 ]
Title: Ternary and $n$-ary $f$-distributive Structures, Abstract: We introduce and study ternary $f$-distributive structures, Ternary $f$-quandles and more generally their higher $n$-ary analogues. A classification of ternary $f$-quandles is provided in low dimensions. Moreover, we study extension theory and introduce a cohomology theory for ternary, and more generally $n$-ary, $f$-quandles. Furthermore, we give some computational examples.
[ 0, 0, 1, 0, 0, 0 ]
Title: Tunable high-harmonic generation by chromatic focusing of few-cycle laser pulses, Abstract: In this work we study the impact of chromatic focusing of few-cycle laser pulses on high-order harmonic generation (HHG) through analysis of the emitted extreme ultraviolet (XUV) radiation. Chromatic focusing is usually avoided in the few-cycle regime, as the pulse spatio-temporal structure may be highly distorted by the spatiotemporal aberrations. Here, however, we demonstrate it as an additional control parameter to modify the generated XUV radiation. We present experiments where few-cycle pulses are focused by a singlet lens in a Kr gas jet. The chromatic distribution of focal lengths allows us to tune HHG spectra by changing the relative singlet-target distance. Interestingly, we also show that the degree of chromatic aberration needed to this control does not degrade substantially the harmonic conversion efficiency, still allowing for the generation of supercontinua with the chirped-pulse scheme, demonstrated previously for achromatic focussing. We back up our experiments with theoretical simulations reproducing the experimental HHG results depending on diverse parameters (input pulse spectral phase, pulse duration, focus position) and proving that, under the considered parameters, the attosecond pulse train remains very similar to the achromatic case, even showing cases of isolated attosecond pulse generation for near single-cycle driving pulses.
[ 0, 1, 0, 0, 0, 0 ]
Title: Settling the query complexity of non-adaptive junta testing, Abstract: We prove that any non-adaptive algorithm that tests whether an unknown Boolean function $f: \{0, 1\}^n\to \{0, 1\}$ is a $k$-junta or $\epsilon$-far from every $k$-junta must make $\widetilde{\Omega}(k^{3/2} / \epsilon)$ many queries for a wide range of parameters $k$ and $\epsilon$. Our result dramatically improves previous lower bounds from [BGSMdW13, STW15], and is essentially optimal given Blais's non-adaptive junta tester from [Blais08], which makes $\widetilde{O}(k^{3/2})/\epsilon$ queries. Combined with the adaptive tester of [Blais09] which makes $O(k\log k + k /\epsilon)$ queries, our result shows that adaptivity enables polynomial savings in query complexity for junta testing.
[ 1, 0, 0, 0, 0, 0 ]
Title: Cross-layer Optimization for Ultra-reliable and Low-latency Radio Access Networks, Abstract: In this paper, we propose a framework for cross-layer optimization to ensure ultra-high reliability and ultra-low latency in radio access networks, where both transmission delay and queueing delay are considered. With short transmission time, the blocklength of channel codes is finite, and the Shannon Capacity cannot be used to characterize the maximal achievable rate with given transmission error probability. With randomly arrived packets, some packets may violate the queueing delay. Moreover, since the queueing delay is shorter than the channel coherence time in typical scenarios, the required transmit power to guarantee the queueing delay and transmission error probability will become unbounded even with spatial diversity. To ensure the required quality-of-service (QoS) with finite transmit power, a proactive packet dropping mechanism is introduced. Then, the overall packet loss probability includes transmission error probability, queueing delay violation probability, and packet dropping probability. We optimize the packet dropping policy, power allocation policy, and bandwidth allocation policy to minimize the transmit power under the QoS constraint. The optimal solution is obtained, which depends on both channel and queue state information. Simulation and numerical results validate our analysis, and show that setting packet loss probabilities equal is a near optimal solution.
[ 1, 0, 0, 0, 0, 0 ]
Title: Network Inference via the Time-Varying Graphical Lasso, Abstract: Many important problems can be modeled as a system of interconnected entities, where each entity is recording time-dependent observations or measurements. In order to spot trends, detect anomalies, and interpret the temporal dynamics of such data, it is essential to understand the relationships between the different entities and how these relationships evolve over time. In this paper, we introduce the time-varying graphical lasso (TVGL), a method of inferring time-varying networks from raw time series data. We cast the problem in terms of estimating a sparse time-varying inverse covariance matrix, which reveals a dynamic network of interdependencies between the entities. Since dynamic network inference is a computationally expensive task, we derive a scalable message-passing algorithm based on the Alternating Direction Method of Multipliers (ADMM) to solve this problem in an efficient way. We also discuss several extensions, including a streaming algorithm to update the model and incorporate new observations in real time. Finally, we evaluate our TVGL algorithm on both real and synthetic datasets, obtaining interpretable results and outperforming state-of-the-art baselines in terms of both accuracy and scalability.
[ 1, 0, 1, 0, 0, 0 ]
Title: Construction of dynamical semigroups by a functional regularisation à la Kato, Abstract: A functional version of the Kato one-parametric regularisation for the construction of a dynamical semigroup generator of a relative bound one perturbation is introduced. It does not require that the minus generator of the unperturbed semigroup is a positivity preserving operator. The regularisation is illustrated by an example of a boson-number cut-off regularisation.
[ 0, 0, 1, 0, 0, 0 ]
Title: Visual Reasoning with Multi-hop Feature Modulation, Abstract: Recent breakthroughs in computer vision and natural language processing have spurred interest in challenging multi-modal tasks such as visual question-answering and visual dialogue. For such tasks, one successful approach is to condition image-based convolutional network computation on language via Feature-wise Linear Modulation (FiLM) layers, i.e., per-channel scaling and shifting. We propose to generate the parameters of FiLM layers going up the hierarchy of a convolutional network in a multi-hop fashion rather than all at once, as in prior work. By alternating between attending to the language input and generating FiLM layer parameters, this approach is better able to scale to settings with longer input sequences such as dialogue. We demonstrate that multi-hop FiLM generation achieves state-of-the-art for the short input sequence task ReferIt --- on-par with single-hop FiLM generation --- while also significantly outperforming prior state-of-the-art and single-hop FiLM generation on the GuessWhat?! visual dialogue task.
[ 0, 0, 0, 1, 0, 0 ]
Title: Ultrahigh capacitive energy storage in highly oriented BaZr(x)Ti(1-x)O3 thin films prepared by pulsed laser deposition, Abstract: We report structural, optical, temperature and frequency dependent dielectric, and energy storage properties of pulsed laser deposited (100) highly textured BaZr(x)Ti(1-x)O3 (x = 0.3, 0.4 and 0.5) relaxor ferroelectric thin films on La0.7Sr0.3MnO3/MgO substrates which make this compound as a potential lead-free capacitive energy storage material for scalable electronic devices. A high dielectric constant of ~1400 - 3500 and a low dielectric loss of <0.025 were achieved at 10 kHz for all three compositions at ambient conditions. Ultrahigh stored and recoverable electrostatic energy densities as high as 214 +/- 1 and 156 +/- 1 J/cm3, respectively, were demonstrated at a sustained high electric field of ~3 MV/cm with an efficiency of 72.8 +/- 0.6 % in optimum 30% Zr substituted BaTiO3 composition.
[ 0, 1, 0, 0, 0, 0 ]
Title: Highly Efficient Human Action Recognition with Quantum Genetic Algorithm Optimized Support Vector Machine, Abstract: In this paper we propose the use of quantum genetic algorithm to optimize the support vector machine (SVM) for human action recognition. The Microsoft Kinect sensor can be used for skeleton tracking, which provides the joints' position data. However, how to extract the motion features for representing the dynamics of a human skeleton is still a challenge due to the complexity of human motion. We present a highly efficient features extraction method for action classification, that is, using the joint angles to represent a human skeleton and calculating the variance of each angle during an action time window. Using the proposed representation, we compared the human action classification accuracy of two approaches, including the optimized SVM based on quantum genetic algorithm and the conventional SVM with grid search. Experimental results on the MSR-12 dataset show that the conventional SVM achieved an accuracy of $ 93.85\% $. The proposed approach outperforms the conventional method with an accuracy of $ 96.15\% $.
[ 1, 0, 0, 1, 0, 0 ]
Title: Differential relations for almost Belyi maps, Abstract: Several kinds of differential relations for polynomial components of almost Belyi maps are presented. Saito's theory of free divisors give particularly interesting (yet conjectural) logarithmic action of vector fields. The differential relations implied by Kitaev's construction of algebraic Painleve VI solutions through pull-back transformations are used to compute almost Belyi maps for the pull-backs giving all genus 0 and 1 Painleve VI solutions in the Lisovyy-Tykhyy classification.
[ 0, 0, 1, 0, 0, 0 ]
Title: Comparative Study of Virtual Machines and Containers for DevOps Developers, Abstract: In this work, we plan to develop a system to compare virtual machines with container technology. We would devise ways to measure the administrator effort of containers vs. Virtual Machines (VMs). Metrics that will be tested against include human efforts required, ease of migration, resource utilization and ease of use using containers and virtual machines.
[ 1, 0, 0, 0, 0, 0 ]
Title: Periodic fourth-order cubic NLS: Local well-posedness and Non-squeezing property, Abstract: In this paper, we consider the cubic fourth-order nonlinear Schrödinger equation (4NLS) under the periodic boundary condition. We prove two results. One is the local well-posedness in $H^s$ with $-1/3 \le s < 0$ for the Cauchy problem of the Wick ordered 4NLS. The other one is the non-squeezing property for the flow map of 4NLS in the symplectic phase space $L^2(\mathbb{T})$. To prove the former we used the ideas introduced in [Takaoka and Tsutsumi 2004] and [Nakanish et al 2010], and to prove the latter we used the ideas in [Colliander et al 2005].
[ 0, 0, 1, 0, 0, 0 ]
Title: Measuring the unmeasurable - a project of domestic violence risk prediction and management, Abstract: The prevention of domestic violence (DV) have aroused serious concerns in Taiwan because of the disparity between the increasing amount of reported DV cases that doubled over the past decade and the scarcity of social workers. Additionally, a large amount of data was collected when social workers use the predominant case management approach to document case reports information. However, these data were not properly stored or organized. To improve the efficiency of DV prevention and risk management, we worked with Taipei City Government and utilized the 2015 data from its DV database to perform a spatial pattern analysis of the reports of DV cases to build a DV risk map. However, during our map building process, the issue of confounding bias arose because we were not able to verify if reported cases truly reflected real violence occurrence or were simply false reports from potential victim's neighbors. Therefore, we used the random forest method to build a repeat victimization risk prediction model. The accuracy and F1-measure of our model were 96.3% and 62.8%. This model helped social workers differentiate the risk level of new cases, which further reduced their major workload significantly. To our knowledge, this is the first project that utilized machine learning in DV prevention. The research approach and results of this project not only can improve DV prevention process, but also be applied to other social work or criminal prevention areas.
[ 1, 0, 0, 0, 0, 0 ]
Title: Embedded real-time monitoring using SystemC in IMA network, Abstract: Avionics is one kind of domain where prevention prevails. Nonetheless fails occur. Sometimes due to pilot misreacting, flooded in information. Sometimes information itself would be better verified than trusted. To avoid some kind of failure, it has been thought to add,in midst of the ARINC664 aircraft data network, a new kind of monitoring.
[ 1, 0, 0, 0, 0, 0 ]
Title: One pixel attack for fooling deep neural networks, Abstract: Recent research has revealed that the output of Deep Neural Networks (DNN) can be easily altered by adding relatively small perturbations to the input vector. In this paper, we analyze an attack in an extremely limited scenario where only one pixel can be modified. For that we propose a novel method for generating one-pixel adversarial perturbations based on differential evolution(DE). It requires less adversarial information(a black-box attack) and can fool more types of networks due to the inherent features of DE. The results show that 68.36% of the natural images in CIFAR-10 test dataset and 41.22% of the ImageNet (ILSVRC 2012) validation images can be perturbed to at least one target class by modifying just one pixel with 73.22% and 5.52% confidence on average. Thus, the proposed attack explores a different take on adversarial machine learning in an extreme limited scenario, showing that current DNNs are also vulnerable to such low dimension attacks. Besides, we also illustrate an important application of DE (or broadly speaking, evolutionary computation) in the domain of adversarial machine learning: creating tools that can effectively generate low-cost adversarial attacks against neural networks for evaluating robustness. The code is available on: this https URL
[ 1, 0, 0, 1, 0, 0 ]
Title: Multi-proton bunch driven hollow plasma wakefield acceleration in the nonlinear regime, Abstract: Proton-driven plasma wakefield acceleration has been demonstrated in simulations to be capable of accelerating particles to the energy frontier in a single stage, but its potential is hindered by the fact that currently available proton bunches are orders of magnitude longer than the plasma wavelength. Fortunately, proton micro-bunching allows driving plasma waves resonantly. In this paper, we propose using a hollow plasma channel for multiple proton bunch driven plasma wakefield acceleration and demonstrate that it enables the operation in the nonlinear regime and resonant excitation of strong plasma waves. This new regime also involves beneficial features of hollow channels for the accelerated beam (such as emittance preservation and uniform accelerating field) and long buckets of stable deceleration for the drive beam. The regime is attained at a proper ratio among plasma skin depth, driver radius, hollow channel radius, and micro-bunch period.
[ 0, 1, 0, 0, 0, 0 ]
Title: Large-Scale Mapping of Human Activity using Geo-Tagged Videos, Abstract: This paper is the first work to perform spatio-temporal mapping of human activity using the visual content of geo-tagged videos. We utilize a recent deep-learning based video analysis framework, termed hidden two-stream networks, to recognize a range of activities in YouTube videos. This framework is efficient and can run in real time or faster which is important for recognizing events as they occur in streaming video or for reducing latency in analyzing already captured video. This is, in turn, important for using video in smart-city applications. We perform a series of experiments to show our approach is able to accurately map activities both spatially and temporally. We also demonstrate the advantages of using the visual content over the tags/titles.
[ 1, 0, 0, 0, 0, 0 ]
Title: Efficient Exact and Approximate Algorithms for Computing Betweenness Centrality in Directed Graphs, Abstract: Graphs are an important tool to model data in different domains, including social networks, bioinformatics and the world wide web. Most of the networks formed in these domains are directed graphs, where all the edges have a direction and they are not symmetric. Betweenness centrality is an important index widely used to analyze networks. In this paper, first given a directed network $G$ and a vertex $r \in V(G)$, we propose a new exact algorithm to compute betweenness score of $r$. Our algorithm pre-computes a set $\mathcal{RV}(r)$, which is used to prune a huge amount of computations that do not contribute in the betweenness score of $r$. Time complexity of our exact algorithm depends on $|\mathcal{RV}(r)|$ and it is respectively $\Theta(|\mathcal{RV}(r)|\cdot|E(G)|)$ and $\Theta(|\mathcal{RV}(r)|\cdot|E(G)|+|\mathcal{RV}(r)|\cdot|V(G)|\log |V(G)|)$ for unweighted graphs and weighted graphs with positive weights. $|\mathcal{RV}(r)|$ is bounded from above by $|V(G)|-1$ and in most cases, it is a small constant. Then, for the cases where $\mathcal{RV}(r)$ is large, we present a simple randomized algorithm that samples from $\mathcal{RV}(r)$ and performs computations for only the sampled elements. We show that this algorithm provides an $(\epsilon,\delta)$-approximation of the betweenness score of $r$. Finally, we perform extensive experiments over several real-world datasets from different domains for several randomly chosen vertices as well as for the vertices with the highest betweenness scores. Our experiments reveal that in most cases, our algorithm significantly outperforms the most efficient existing randomized algorithms, in terms of both running time and accuracy. Our experiments also show that our proposed algorithm computes betweenness scores of all vertices in the sets of sizes 5, 10 and 15, much faster and more accurate than the most efficient existing algorithms.
[ 1, 0, 0, 0, 0, 0 ]
Title: A Competitive Algorithm for Online Multi-Robot Exploration of a Translating Plume, Abstract: In this paper, we study the problem of exploring a translating plume with a team of aerial robots. The shape and the size of the plume are unknown to the robots. The objective is to find a tour for each robot such that they collectively explore the plume. Specifically, the tours must be such that each point in the plume must be visible from the field-of-view of some robot along its tour. We propose a recursive Depth-First Search (DFS)-based algorithm that yields a constant competitive ratio for the exploration problem. The competitive ratio is $\frac{2(S_r+S_p)(R+\lfloor\log{R}\rfloor)}{(S_r-S_p)(1+\lfloor\log{R}\rfloor)}$ where $R$ is the number of robots, and $S_r$ and $S_p$ are the robot speed and the plume speed, respectively. We also consider a more realistic scenario where the plume shape is not restricted to grid cells but an arbitrary shape. We show our algorithm has $\frac{2(S_r+S_p)(18R+\lfloor\log{R}\rfloor)}{(S_r-S_p)(1+\lfloor\log{R}\rfloor)}$ competitive ratio under the fat condition. We empirically verify our algorithm using simulations.
[ 1, 0, 0, 0, 0, 0 ]
Title: Warped Riemannian metrics for location-scale models, Abstract: The present paper shows that warped Riemannian metrics, a class of Riemannian metrics which play a prominent role in Riemannian geometry, are also of fundamental importance in information geometry. Precisely, the paper features a new theorem, which states that the Rao-Fisher information metric of any location-scale model, defined on a Riemannian manifold, is a warped Riemannian metric, whenever this model is invariant under the action of some Lie group. This theorem is a valuable tool in finding the expression of the Rao-Fisher information metric of location-scale models defined on high-dimensional Riemannian manifolds. Indeed, a warped Riemannian metric is fully determined by only two functions of a single variable, irrespective of the dimension of the underlying Riemannian manifold. Starting from this theorem, several original contributions are made. The expression of the Rao-Fisher information metric of the Riemannian Gaussian model is provided, for the first time in the literature. A generalised definition of the Mahalanobis distance is introduced, which is applicable to any location-scale model defined on a Riemannian manifold. The solution of the geodesic equation is obtained, for any Rao-Fisher information metric defined in terms of warped Riemannian metrics. Finally, using a mixture of analytical and numerical computations, it is shown that the parameter space of the von Mises-Fisher model of $n$-dimensional directional data, when equipped with its Rao-Fisher information metric, becomes a Hadamard manifold, a simply-connected complete Riemannian manifold of negative sectional curvature, for $n = 2,\ldots,8$. Hopefully, in upcoming work, this will be proved for any value of $n$.
[ 0, 0, 1, 1, 0, 0 ]
Title: Correcting rural building annotations in OpenStreetMap using convolutional neural networks, Abstract: Rural building mapping is paramount to support demographic studies and plan actions in response to crisis that affect those areas. Rural building annotations exist in OpenStreetMap (OSM), but their quality and quantity are not sufficient for training models that can create accurate rural building maps. The problems with these annotations essentially fall into three categories: (i) most commonly, many annotations are geometrically misaligned with the updated imagery; (ii) some annotations do not correspond to buildings in the images (they are misannotations or the buildings have been destroyed); and (iii) some annotations are missing for buildings in the images (the buildings were never annotated or were built between subsequent image acquisitions). First, we propose a method based on Markov Random Field (MRF) to align the buildings with their annotations. The method maximizes the correlation between annotations and a building probability map while enforcing that nearby buildings have similar alignment vectors. Second, the annotations with no evidence in the building probability map are removed. Third, we present a method to detect non-annotated buildings with predefined shapes and add their annotation. The proposed methodology shows considerable improvement in accuracy of the OSM annotations for two regions of Tanzania and Zimbabwe, being more accurate than state-of-the-art baselines.
[ 1, 0, 0, 0, 0, 0 ]
Title: Closed-form Harmonic Contrast Control with Surface Impedance Coatings for Conductive Objects, Abstract: The problem of suppressing the scattering from conductive objects is addressed in terms of harmonic contrast reduction. A unique compact closed-form solution for a surface impedance $Z_s(m,kr)$ is found in a straightforward manner and without any approximation as a function of the harmonic index $m$ (scattering mode to suppress) and of the frequency regime $kr$ (product of wavenumber $k$ and radius $r$ of the cloaked system) at any frequency regime. In the quasi-static limit, mantle cloaking is obtained as a particular case for $kr \ll 1$ and $m=0$. In addition, beyond quasi-static regime, impedance coatings for a selected dominant harmonic wave can be designed with proper dispersive behaviour, resulting in improved reduction levels and harmonic filtering capability.
[ 0, 1, 0, 0, 0, 0 ]
Title: Shape Convergence for Aggregate Tiles in Conformal Tilings, Abstract: Given a substitution tiling $T$ of the plane with subdivision operator $\tau$, we study the conformal tilings $\mathcal{T}_n$ associated with $\tau^n T$. We prove that aggregate tiles within $\mathcal{T}_n$ converge in shape as $n\rightarrow \infty$ to their associated Euclidean tiles in $T$.
[ 0, 0, 1, 0, 0, 0 ]
Title: Performance and sensitivity of vortex coronagraphs on segmented space telescopes, Abstract: The detection of molecular species in the atmospheres of earth-like exoplanets orbiting nearby stars requires an optical system that suppresses starlight and maximizes the sensitivity to the weak planet signals at small angular separations. Achieving sufficient contrast performance on a segmented aperture space telescope is particularly challenging due to unwanted diffraction within the telescope from amplitude and phase discontinuities in the pupil. Apodized vortex coronagraphs are a promising solution that theoretically meet the performance needs for high contrast imaging with future segmented space telescopes. We investigate the sensitivity of apodized vortex coronagraphs to the expected aberrations, including segment co-phasing errors in piston and tip/tilt as well as other low-order and mid-spatial frequency aberrations. Coronagraph designs and their associated telescope requirements are identified for conceptual HabEx and LUVOIR telescope designs.
[ 0, 1, 0, 0, 0, 0 ]
Title: Local systems on complements of arrangements of smooth, complex algebraic hypersurfaces, Abstract: We consider smooth, complex quasi-projective varieties $U$ which admit a compactification with a boundary which is an arrangement of smooth algebraic hypersurfaces. If the hypersurfaces intersect locally like hyperplanes, and the relative interiors of the hypersurfaces are Stein manifolds, we prove that the cohomology of certain local systems on $U$ vanishes. As an application, we show that complements of linear, toric, and elliptic arrangements are both duality and abelian duality spaces.
[ 0, 0, 1, 0, 0, 0 ]
Title: Some Open Problems in Random Matrix Theory and the Theory of Integrable Systems. II, Abstract: We describe a list of open problems in random matrix theory and the theory of integrable systems that was presented at the conference Asymptotics in Integrable Systems, Random Matrices and Random Processes and Universality, Centre de Recherches Mathematiques, Montreal, June 7-11, 2015. We also describe progress that has been made on problems in an earlier list presented by the author on the occasion of his 60th birthday in 2005 (see [Deift P., Contemp. Math., Vol. 458, Amer. Math. Soc., Providence, RI, 2008, 419-430, arXiv:0712.0849]).
[ 0, 1, 1, 0, 0, 0 ]
Title: A semi-parametric estimation for max-mixture spatial processes, Abstract: We proposed a semi-parametric estimation procedure in order to estimate the parameters of a max-mixture model and also of a max-stable model (inverse max-stable model) as an alternative to composite likelihood. A good estimation by the proposed estimator required the dependence measure to detect all dependence structures in the model, especially when dealing with the max-mixture model. We overcame this challenge by using the F-madogram. The semi-parametric estimation was then based on a quasi least square method, by minimizing the square difference between the theoretical F-madogram and an empirical one. We evaluated the performance of this estimator through a simulation study. It was shown that on an average, the estimation is performed well, although in some cases, it encountered some difficulties. We apply our estimation procedure to model the daily rainfalls over the East Australia.
[ 0, 0, 1, 1, 0, 0 ]
Title: Spectroscopic Observation and Analysis of HII regions in M33 with MMT: Temperatures and Oxygen Abundances, Abstract: The spectra of 413 star-forming (or HII) regions in M33 (NGC 598) were observed by using the multifiber spectrograph of Hectospec at the 6.5-m Multiple Mirror Telescope (MMT). By using this homogeneous spectra sample, we measured the intensities of emission lines and some physical parameters, such as electron temperatures, electron densities, and metallicities. Oxygen abundances were derived via the direct method (when available) and two empirical strong-line methods, namely, O3N2 and N2. In the high-metallicity end, oxygen abundances derived from O3N2 calibration were higher than those derived from N2 index, indicating an inconsistency between O3N2 and N2 calibrations. We presented a detailed analysis of the spatial distribution of gas-phase oxygen abundances in M33 and confirmed the existence of the axisymmetric global metallicity distribution widely assumed in literature. Local variations were also observed and subsequently associated with spiral structures to provide evidence of radial migration driven by arms. Our O/H gradient fitted out to 1.1 $R_{25}$ resulted in slopes of $-0.17\pm0.03$, $-0.19\pm0.01$, and $-0.16\pm0.17$ dex $R_{25}^{-1}$ utilizing abundances from O3N2, N2 diagnostics, and direct method, respectively.
[ 0, 1, 0, 0, 0, 0 ]
Title: Deep learning to achieve clinically applicable segmentation of head and neck anatomy for radiotherapy, Abstract: Over half a million individuals are diagnosed with head and neck cancer each year worldwide. Radiotherapy is an important curative treatment for this disease, but it requires manually intensive delineation of radiosensitive organs at risk (OARs). This planning process can delay treatment commencement. While auto-segmentation algorithms offer a potentially time-saving solution, the challenges in defining, quantifying and achieving expert performance remain. Adopting a deep learning approach, we demonstrate a 3D U-Net architecture that achieves performance similar to experts in delineating a wide range of head and neck OARs. The model was trained on a dataset of 663 deidentified computed tomography (CT) scans acquired in routine clinical practice and segmented according to consensus OAR definitions. We demonstrate its generalisability through application to an independent test set of 24 CT scans available from The Cancer Imaging Archive collected at multiple international sites previously unseen to the model, each segmented by two independent experts and consisting of 21 OARs commonly segmented in clinical practice. With appropriate validation studies and regulatory approvals, this system could improve the effectiveness of radiotherapy pathways.
[ 0, 0, 0, 1, 0, 0 ]
Title: Intelligent Parameter Tuning in Optimization-based Iterative CT Reconstruction via Deep Reinforcement Learning, Abstract: A number of image-processing problems can be formulated as optimization problems. The objective function typically contains several terms specifically designed for different purposes. Parameters in front of these terms are used to control the relative weights among them. It is of critical importance to tune these parameters, as quality of the solution depends on their values. Tuning parameter is a relatively straightforward task for a human, as one can intelligently determine the direction of parameter adjustment based on the solution quality. Yet manual parameter tuning is not only tedious in many cases, but becomes impractical when a number of parameters exist in a problem. Aiming at solving this problem, this paper proposes an approach that employs deep reinforcement learning to train a system that can automatically adjust parameters in a human-like manner. We demonstrate our idea in an example problem of optimization-based iterative CT reconstruction with a pixel-wise total-variation regularization term. We set up a parameter tuning policy network (PTPN), which maps an CT image patch to an output that specifies the direction and amplitude by which the parameter at the patch center is adjusted. We train the PTPN via an end-to-end reinforcement learning procedure. We demonstrate that under the guidance of the trained PTPN for parameter tuning at each pixel, reconstructed CT images attain quality similar or better than in those reconstructed with manually tuned parameters.
[ 0, 1, 0, 0, 0, 0 ]
Title: Adversarial Examples that Fool Detectors, Abstract: An adversarial example is an example that has been adjusted to produce a wrong label when presented to a system at test time. To date, adversarial example constructions have been demonstrated for classifiers, but not for detectors. If adversarial examples that could fool a detector exist, they could be used to (for example) maliciously create security hazards on roads populated with smart vehicles. In this paper, we demonstrate a construction that successfully fools two standard detectors, Faster RCNN and YOLO. The existence of such examples is surprising, as attacking a classifier is very different from attacking a detector, and that the structure of detectors - which must search for their own bounding box, and which cannot estimate that box very accurately - makes it quite likely that adversarial patterns are strongly disrupted. We show that our construction produces adversarial examples that generalize well across sequences digitally, even though large perturbations are needed. We also show that our construction yields physical objects that are adversarial.
[ 1, 0, 0, 0, 0, 0 ]
Title: Direct and mediating influences of user-developer perception gaps in requirements understanding on user participation, Abstract: User participation is considered an effective way to conduct requirements engineering, but user-developer perception gaps in requirements understanding occur frequently. Since user participation in practice is not as active as we expect and the requirements perception gap has been recognized as a risk that negatively affects projects, exploring whether user-developer perception gaps in requirements understanding will hinder user participation is worthwhile. This will help develop a greater comprehension of the intertwined relationship between user participation and perception gap, a topic that has not yet been extensively examined. This study investigates the direct and mediating influences of user-developer requirements perception gaps on user participation by integrating requirements uncertainty and top management support. Survey data collected from 140 subjects were examined and analyzed using structural equation modeling. The results indicate that perception gaps have a direct negative effect on user participation and negate completely the positive effect of top management support on user participation. Additionally, perception gaps do not have a mediating effect between requirements uncertainty and user participation because requirements uncertainty does not significantly and directly affect user participation, but requirements uncertainty indirectly influences user participation due to its significant direct effect on perception gaps. The theoretical and practical implications are discussed, and limitations and possible future research areas are identified.
[ 1, 0, 0, 0, 0, 0 ]
Title: A fast numerical method for ideal fluid flow in domains with multiple stirrers, Abstract: A collection of arbitrarily-shaped solid objects, each moving at a constant speed, can be used to mix or stir ideal fluid, and can give rise to interesting flow patterns. Assuming these systems of fluid stirrers are two-dimensional, the mathematical problem of resolving the flow field - given a particular distribution of any finite number of stirrers of specified shape and speed - can be formulated as a Riemann-Hilbert problem. We show that this Riemann-Hilbert problem can be solved numerically using a fast and accurate algorithm for any finite number of stirrers based around a boundary integral equation with the generalized Neumann kernel. Various systems of fluid stirrers are considered, and our numerical scheme is shown to handle highly multiply connected domains (i.e. systems of many fluid stirrers) with minimal computational expense.
[ 0, 0, 1, 0, 0, 0 ]
Title: A Short Survey on Probabilistic Reinforcement Learning, Abstract: A reinforcement learning agent tries to maximize its cumulative payoff by interacting in an unknown environment. It is important for the agent to explore suboptimal actions as well as to pick actions with highest known rewards. Yet, in sensitive domains, collecting more data with exploration is not always possible, but it is important to find a policy with a certain performance guaranty. In this paper, we present a brief survey of methods available in the literature for balancing exploration-exploitation trade off and computing robust solutions from fixed samples in reinforcement learning.
[ 1, 0, 0, 1, 0, 0 ]
Title: The Muon g-2 experiment at Fermilab, Abstract: The upcoming Fermilab E989 experiment will measure the muon anomalous magnetic moment $a_{\mu}$ . This measurement is motivated by the previous measurement performed in 2001 by the BNL E821 experiment that reported a 3-4 standard deviation discrepancy between the measured value and the Standard Model prediction. The new measurement at Fermilab aims to improve the precision by a factor of four reducing the total uncertainty from 540 parts per billion (BNL E821) to 140 parts per billion (Fermilab E989). This paper gives the status of the experiment.
[ 0, 1, 0, 0, 0, 0 ]
Title: Bypass Fraud Detection: Artificial Intelligence Approach, Abstract: Telecom companies are severely damaged by bypass fraud or SIM boxing. However, there is a shortage of published research to tackle this problem. The traditional method of Test Call Generating is easily overcome by fraudsters and the need for more sophisticated ways is inevitable. In this work, we are developing intelligent algorithms that mine a huge amount of mobile operator's data and detect the SIMs that are used to bypass international calls. This method will make it hard for fraudsters to generate revenue and hinder their work. Also by reducing fraudulent activities, quality of service can be increased as well as customer satisfaction. Our technique has been evaluated and tested on real world mobile operator data, and proved to be very efficient.
[ 1, 0, 0, 0, 0, 0 ]
Title: Scenario Reduction Revisited: Fundamental Limits and Guarantees, Abstract: The goal of scenario reduction is to approximate a given discrete distribution with another discrete distribution that has fewer atoms. We distinguish continuous scenario reduction, where the new atoms may be chosen freely, and discrete scenario reduction, where the new atoms must be chosen from among the existing ones. Using the Wasserstein distance as measure of proximity between distributions, we identify those $n$-point distributions on the unit ball that are least susceptible to scenario reduction, i.e., that have maximum Wasserstein distance to their closest $m$-point distributions for some prescribed $m<n$. We also provide sharp bounds on the added benefit of continuous over discrete scenario reduction. Finally, to our best knowledge, we propose the first polynomial-time constant-factor approximations for both discrete and continuous scenario reduction as well as the first exact exponential-time algorithms for continuous scenario reduction.
[ 0, 0, 1, 0, 0, 0 ]
Title: Testing the science/technology relationship by analysis of patent citations of scientific papers after decomposition of both science and technology, Abstract: The relationship of scientific knowledge development to technological development is widely recognized as one of the most important and complex aspects of technological evolution. This paper adds to our understanding of the relationship through use of a more rigorous structure for differentiating among technologies based upon technological domains (defined as consisting of the artifacts over time that fulfill a specific generic function using a specific body of technical knowledge).
[ 1, 1, 0, 0, 0, 0 ]
Title: A Mention-Ranking Model for Abstract Anaphora Resolution, Abstract: Resolving abstract anaphora is an important, but difficult task for text understanding. Yet, with recent advances in representation learning this task becomes a more tangible aim. A central property of abstract anaphora is that it establishes a relation between the anaphor embedded in the anaphoric sentence and its (typically non-nominal) antecedent. We propose a mention-ranking model that learns how abstract anaphors relate to their antecedents with an LSTM-Siamese Net. We overcome the lack of training data by generating artificial anaphoric sentence--antecedent pairs. Our model outperforms state-of-the-art results on shell noun resolution. We also report first benchmark results on an abstract anaphora subset of the ARRAU corpus. This corpus presents a greater challenge due to a mixture of nominal and pronominal anaphors and a greater range of confounders. We found model variants that outperform the baselines for nominal anaphors, without training on individual anaphor data, but still lag behind for pronominal anaphors. Our model selects syntactically plausible candidates and -- if disregarding syntax -- discriminates candidates using deeper features.
[ 1, 0, 0, 1, 0, 0 ]
Title: Harmonic density interpolation methods for high-order evaluation of Laplace layer potentials in 2D and 3D, Abstract: We present an effective harmonic density interpolation method for the numerical evaluation of singular and nearly singular Laplace boundary integral operators and layer potentials in two and three spatial dimensions. The method relies on the use of Green's third identity and local Taylor-like interpolations of density functions in terms of harmonic polynomials. The proposed technique effectively regularizes the singularities present in boundary integral operators and layer potentials, and recasts the latter in terms of integrands that are bounded or even more regular, depending on the order of the density interpolation. The resulting boundary integrals can then be easily, accurately, and inexpensively evaluated by means of standard quadrature rules. A variety of numerical examples demonstrate the effectiveness of the technique when used in conjunction with the classical trapezoidal rule (to integrate over smooth curves) in two-dimensions, and with a Chebyshev-type quadrature rule (to integrate over surfaces given as unions of non-overlapping quadrilateral patches) in three-dimensions.
[ 0, 1, 0, 0, 0, 0 ]
Title: The Thermophysical Properties of the Bagnold Dunes, Mars: Ground-truthing Orbital Data, Abstract: In this work, we compare the thermophysical properties and particle sizes derived from the Mars Science Laboratory (MSL) rover's Ground Temperature Sensor (GTS) of the Bagnold dunes, specifically Namib dune, to those derived orbitally from Thermal Emission Imaging System (THEMIS), ultimately linking these measurements to ground-truth particle sizes determined from Mars Hand Lens Imager (MAHLI) images. In general, we find that all three datasets report consistent particle sizes for the Bagnold dunes (~110-350 microns, and are within measurement and model uncertainties), indicating that particle sizes of homogeneous materials determined from orbit are reliable. Furthermore, we examine the effects of two physical characteristics that could influence the modeled thermal inertia and particle sizes, including: 1) fine-scale (cm-m scale) ripples, and 2) thin layering of indurated/armored materials. To first order, we find small scale ripples and thin (approximately centimeter scale) layers do not significantly affect the determination of bulk thermal inertia from orbital thermal data determined from a single nighttime temperature. Modeling of a layer of coarse or indurated material reveals that a thin layer (< ~5 mm; similar to what was observed by the Curiosity rover) would not significantly change the observed thermal properties of the surface and would be dominated by the properties of the underlying material. Thermal inertia and grain sizes of relatively homogeneous materials derived from nighttime orbital data should be considered as reliable, as long as there are not significant sub-pixel anisothermality effects (e.g. lateral mixing of multiple thermophysically distinct materials).
[ 0, 1, 0, 0, 0, 0 ]
Title: Algorithmic Trading with Fitted Q Iteration and Heston Model, Abstract: We present the use of the fitted Q iteration in algorithmic trading. We show that the fitted Q iteration helps alleviate the dimension problem that the basic Q-learning algorithm faces in application to trading. Furthermore, we introduce a procedure including model fitting and data simulation to enrich training data as the lack of data is often a problem in realistic application. We experiment our method on both simulated environment that permits arbitrage opportunity and real-world environment by using prices of 450 stocks. In the former environment, the method performs well, implying that our method works in theory. To perform well in the real-world environment, the agents trained might require more training (iteration) and more meaningful variables with predictive value.
[ 0, 0, 0, 0, 0, 1 ]
Title: Mailbox Types for Unordered Interactions, Abstract: We propose a type system for reasoning on protocol conformance and deadlock freedom in networks of processes that communicate through unordered mailboxes. We model these networks in the mailbox calculus, a mild extension of the asynchronous {\pi}-calculus with first-class mailboxes and selective input. The calculus subsumes the actor model and allows us to analyze networks with dynamic topologies and varying number of processes possibly mixing different concurrency abstractions. Well-typed processes are deadlock free and never fail because of unexpected messages. For a non-trivial class of them, junk freedom is also guaranteed. We illustrate the expressiveness of the calculus and of the type system by encoding instances of non-uniform, concurrent objects, binary sessions extended with joins and forks, and some known actor benchmarks.
[ 1, 0, 0, 0, 0, 0 ]
Title: A recursive algorithm and a series expansion related to the homogeneous Boltzmann equation for hard potentials with angular cutoff, Abstract: We consider the spatially homogeneous Boltzmann equation for hard potentials with angular cutoff. This equation has a unique conservative weak solution $(f_t)_{t\geq 0}$, once the initial condition $f_0$ with finite mass and energy is fixed. Taking advantage of the energy conservation, we propose a recursive algorithm that produces a $(0,\infty)\times\mathbb{R}^3$ random variable $(M_t,V_t)$ such that $E[M_t {\bf 1}_{\{V_t \in \cdot\}}]=f_t$. We also write down a series expansion of $f_t$. Although both the algorithm and the series expansion might be theoretically interesting in that they explicitly express $f_t$ in terms of $f_0$, we believe that the algorithm is not very efficient in practice and that the series expansion is rather intractable. This is a tedious extension to non-Maxwellian molecules of Wild's sum and of its interpretation by McKean.
[ 0, 0, 1, 0, 0, 0 ]
Title: Asymptotics of maximum likelihood estimation for stable law with $(M)$ parameterization, Abstract: Asymptotics of maximum likelihood estimation for $\alpha$-stable law are analytically investigated with $(M)$ parameterization. The consistency and asymptotic normality are shown on the interior of the whole parameter space. Although these asymptotics have been proved with $(B)$ parameterization, there are several gaps between. Especially in the latter, the density, so that scores and their derivatives are discontinuous at $\alpha=1$ for $\beta\neq 0$ and usual asymptotics are impossible, whereas in $(M)$ form these quantities are shown to be continuous on the interior of the parameter space. We fill these gaps and provide a convenient theory for applied people. We numerically approximate the Fisher information matrix around the Cauchy law $(\alpha,\beta)=(1,0)$. The results exhibit continuity at $\alpha=1,\,\beta\neq 0$ and this secures the accuracy of our calculations.
[ 0, 0, 1, 1, 0, 0 ]
Title: Enabling Massive Deep Neural Networks with the GraphBLAS, Abstract: Deep Neural Networks (DNNs) have emerged as a core tool for machine learning. The computations performed during DNN training and inference are dominated by operations on the weight matrices describing the DNN. As DNNs incorporate more stages and more nodes per stage, these weight matrices may be required to be sparse because of memory limitations. The GraphBLAS.org math library standard was developed to provide high performance manipulation of sparse weight matrices and input/output vectors. For sufficiently sparse matrices, a sparse matrix library requires significantly less memory than the corresponding dense matrix implementation. This paper provides a brief description of the mathematics underlying the GraphBLAS. In addition, the equations of a typical DNN are rewritten in a form designed to use the GraphBLAS. An implementation of the DNN is given using a preliminary GraphBLAS C library. The performance of the GraphBLAS implementation is measured relative to a standard dense linear algebra library implementation. For various sizes of DNN weight matrices, it is shown that the GraphBLAS sparse implementation outperforms a BLAS dense implementation as the weight matrix becomes sparser.
[ 1, 0, 0, 0, 0, 0 ]
Title: What Can Machine Learning Teach Us about Communications?, Abstract: Rapid improvements in machine learning over the past decade are beginning to have far-reaching effects. For communications, engineers with limited domain expertise can now use off-the-shelf learning packages to design high-performance systems based on simulations. Prior to the current revolution in machine learning, the majority of communication engineers were quite aware that system parameters (such as filter coefficients) could be learned using stochastic gradient descent. It was not at all clear, however, that more complicated parts of the system architecture could be learned as well. In this paper, we discuss the application of machine-learning techniques to two communications problems and focus on what can be learned from the resulting systems. We were pleasantly surprised that the observed gains in one example have a simple explanation that only became clear in hindsight. In essence, deep learning discovered a simple and effective strategy that had not been considered earlier.
[ 1, 0, 0, 1, 0, 0 ]
Title: The efficiency of community detection by most similar node pairs, Abstract: Community analysis is an important way to ascertain whether or not a complex system consists of sub-structures with different properties. In this paper, we give a two level community structure analysis for the SSCI journal system by most similar co-citation pattern. Five different strategies for the selection of most similar node (journal) pairs are introduced. The efficiency is checked by the normalized mutual information technique. Statistical properties and comparisons of the community results show that both of the two level detection could give instructional information for the community structure of complex systems. Further comparisons of the five strategies indicates that, the most efficient strategy is to assign nodes with maximum similarity into the same community whether the similarity information is complete or not, while random selection generates small world local community with no inside order. These results give valuable indication for efficient community detection by most similar node pairs.
[ 1, 0, 0, 0, 0, 0 ]
Title: Infinitely many periodic orbits just above the Mañé critical value on the 2-sphere, Abstract: We introduce a new critical value $c_\infty(L)$ for Tonelli Lagrangians $L$ on the tangent bundle of the 2-sphere without minimizing measures supported on a point. We show that $c_\infty(L)$ is strictly larger than the Mañé critical value $c(L)$, and on every energy level $e\in(c(L),c_\infty(L))$ there exist infinitely many periodic orbits of the Lagrangian system of $L$, one of which is a local minimizer of the free-period action functional. This has applications to Finsler metrics of Randers type on the 2-sphere. We show that, under a suitable criticality assumption on a given Randers metric, after rescaling its magnetic part with a sufficiently large multiplicative constant, the new metric admits infinitely many closed geodesics, one of which is a waist. Examples of critical Randers metrics include the celebrated Katok metric.
[ 0, 0, 1, 0, 0, 0 ]
Title: Decentralized Random Walk-Based Data Collection in Networks, Abstract: We analyze a decentralized random walk-based algorithm for data collection at the sink in a multi-hop sensor network. Our algorithm, Random-Collect, which involves data packets being passed to random neighbors in the network according to a random walk mechanism, requires no configuration and incurs no routing overhead. To analyze this method, we model the data generation process as independent Bernoulli arrivals at the source nodes. We analyze both latency and throughput in this setting, providing a theoretical lower bound for the throughput and a theoretical upper bound for the latency. The main contribution of our paper, however, is the throughput result: we present a general lower bound on the throughput achieved by our data collection method in terms of the underlying network parameters. In particular, we show that the rate at which our algorithm can collect data depends on the spectral gap of the given random walk's transition matrix and if the random walk is simple then it also depends on the maximum and minimum degrees of the graph modeling the network. For latency, we show that the time taken to collect data not only depends on the worst-case hitting time of the given random walk but also depends on the data arrival rate. In fact, our latency bound reflects the data rate-latency trade-off i.e., in order to achieve a higher data rate we need to compromise on latency and vice-versa. We also discuss some examples that demonstrate that our lower bound on the data rate is optimal up to constant factors, i.e., there exists a network topology and sink placement for which the maximum stable data rate is just a constant factor above our lower bound.
[ 1, 0, 0, 0, 0, 0 ]
Title: The redshift distribution of cosmological samples: a forward modeling approach, Abstract: Determining the redshift distribution $n(z)$ of galaxy samples is essential for several cosmological probes including weak lensing. For imaging surveys, this is usually done using photometric redshifts estimated on an object-by-object basis. We present a new approach for directly measuring the global $n(z)$ of cosmological galaxy samples, including uncertainties, using forward modeling. Our method relies on image simulations produced using UFig (Ultra Fast Image Generator) and on ABC (Approximate Bayesian Computation) within the $MCCL$ (Monte-Carlo Control Loops) framework. The galaxy population is modeled using parametric forms for the luminosity functions, spectral energy distributions, sizes and radial profiles of both blue and red galaxies. We apply exactly the same analysis to the real data and to the simulated images, which also include instrumental and observational effects. By adjusting the parameters of the simulations, we derive a set of acceptable models that are statistically consistent with the data. We then apply the same cuts to the simulations that were used to construct the target galaxy sample in the real data. The redshifts of the galaxies in the resulting simulated samples yield a set of $n(z)$ distributions for the acceptable models. We demonstrate the method by determining $n(z)$ for a cosmic shear like galaxy sample from the 4-band Subaru Suprime-Cam data in the COSMOS field. We also complement this imaging data with a spectroscopic calibration sample from the VVDS survey. We compare our resulting posterior $n(z)$ distributions to the one derived from photometric redshifts estimated using 36 photometric bands in COSMOS and find good agreement. This offers good prospects for applying our approach to current and future large imaging surveys.
[ 0, 1, 0, 0, 0, 0 ]
Title: Analysis of equivalence relation in joint sparse recovery, Abstract: The joint sparse recovery problem is a generalization of the single measurement vector problem which is widely studied in Compressed Sensing and it aims to recovery a set of jointly sparse vectors. i.e. have nonzero entries concentrated at common location. Meanwhile l_p-minimization subject to matrices is widely used in a large number of algorithms designed for this problem. Therefore the main contribution in this paper is two theoretical results about this technique. The first one is to prove that in every multiple systems of linear equation, there exists a constant p* such that the original unique sparse solution also can be recovered from a minimization in l_p quasi-norm subject to matrices whenever 0< p<p*. The other one is to show an analysis expression of such p*. Finally, we display the results of one example to confirm the validity of our conclusions.
[ 1, 0, 1, 0, 0, 0 ]
Title: The Stochastic Firefighter Problem, Abstract: The dynamics of infectious diseases spread is crucial in determining their risk and offering ways to contain them. We study sequential vaccination of individuals in networks. In the original (deterministic) version of the Firefighter problem, a fire breaks out at some node of a given graph. At each time step, b nodes can be protected by a firefighter and then the fire spreads to all unprotected neighbors of the nodes on fire. The process ends when the fire can no longer spread. We extend the Firefighter problem to a probabilistic setting, where the infection is stochastic. We devise a simple policy that only vaccinates neighbors of infected nodes and is optimal on regular trees and on general graphs for a sufficiently large budget. We derive methods for calculating upper and lower bounds of the expected number of infected individuals, as well as provide estimates on the budget needed for containment in expectation. We calculate these explicitly on trees, d-dimensional grids, and Erdős Rényi graphs. Finally, we construct a state-dependent budget allocation strategy and demonstrate its superiority over constant budget allocation on real networks following a first order acquaintance vaccination policy.
[ 1, 0, 0, 0, 0, 0 ]
Title: Generalizations of the 'Linear Chain Trick': Incorporating more flexible dwell time distributions into mean field ODE models, Abstract: Mathematical modelers have long known of a "rule of thumb" referred to as the Linear Chain Trick (LCT; aka the Gamma Chain Trick): a technique used to construct mean field ODE models from continuous-time stochastic state transition models where the time an individual spends in a given state (i.e., the dwell time) is Erlang distributed (i.e., gamma distributed with integer shape parameter). Despite the LCT's widespread use, we lack general theory to facilitate the easy application of this technique, especially for complex models. This has forced modelers to choose between constructing ODE models using heuristics with oversimplified dwell time assumptions, using time consuming derivations from first principles, or to instead use non-ODE models (like integro-differential equations or delay differential equations) which can be cumbersome to derive and analyze. Here, we provide analytical results that enable modelers to more efficiently construct ODE models using the LCT or related extensions. Specifically, we 1) provide novel extensions of the LCT to various scenarios found in applications; 2) provide formulations of the LCT and it's extensions that bypass the need to derive ODEs from integral or stochastic model equations; and 3) introduce a novel Generalized Linear Chain Trick (GLCT) framework that extends the LCT to a much broader family of distributions, including the flexible phase-type distributions which can approximate distributions on $\mathbb{R}^+$ and be fit to data. These results give modelers more flexibility to incorporate appropriate dwell time assumptions into mean field ODEs, including conditional dwell time distributions, and these results help clarify connections between individual-level stochastic model assumptions and the structure of corresponding mean field ODEs.
[ 0, 0, 0, 0, 1, 0 ]
Title: Combining Neural Networks and Tree Search for Task and Motion Planning in Challenging Environments, Abstract: We consider task and motion planning in complex dynamic environments for problems expressed in terms of a set of Linear Temporal Logic (LTL) constraints, and a reward function. We propose a methodology based on reinforcement learning that employs deep neural networks to learn low-level control policies as well as task-level option policies. A major challenge in this setting, both for neural network approaches and classical planning, is the need to explore future worlds of a complex and interactive environment. To this end, we integrate Monte Carlo Tree Search with hierarchical neural net control policies trained on expressive LTL specifications. This paper investigates the ability of neural networks to learn both LTL constraints and control policies in order to generate task plans in complex environments. We demonstrate our approach in a simulated autonomous driving setting, where a vehicle must drive down a road in traffic, avoid collisions, and navigate an intersection, all while obeying given rules of the road.
[ 1, 0, 0, 0, 0, 0 ]
Title: BT-Nets: Simplifying Deep Neural Networks via Block Term Decomposition, Abstract: Recently, deep neural networks (DNNs) have been regarded as the state-of-the-art classification methods in a wide range of applications, especially in image classification. Despite the success, the huge number of parameters blocks its deployment to situations with light computing resources. Researchers resort to the redundancy in the weights of DNNs and attempt to find how fewer parameters can be chosen while preserving the accuracy at the same time. Although several promising results have been shown along this research line, most existing methods either fail to significantly compress a well-trained deep network or require a heavy fine-tuning process for the compressed network to regain the original performance. In this paper, we propose the \textit{Block Term} networks (BT-nets) in which the commonly used fully-connected layers (FC-layers) are replaced with block term layers (BT-layers). In BT-layers, the inputs and the outputs are reshaped into two low-dimensional high-order tensors, then block-term decomposition is applied as tensor operators to connect them. We conduct extensive experiments on benchmark datasets to demonstrate that BT-layers can achieve a very large compression ratio on the number of parameters while preserving the representation power of the original FC-layers as much as possible. Specifically, we can get a higher performance while requiring fewer parameters compared with the tensor train method.
[ 1, 0, 0, 1, 0, 0 ]
Title: Resampling Strategy in Sequential Monte Carlo for Constrained Sampling Problems, Abstract: Sequential Monte Carlo (SMC) methods are a class of Monte Carlo methods that are used to obtain random samples of a high dimensional random variable in a sequential fashion. Many problems encountered in applications often involve different types of constraints. These constraints can make the problem much more challenging. In this paper, we formulate a general framework of using SMC for constrained sampling problems based on forward and backward pilot resampling strategies. We review some existing methods under the framework and develop several new algorithms. It is noted that all information observed or imposed on the underlying system can be viewed as constraints. Hence the approach outlined in this paper can be useful in many applications.
[ 0, 0, 0, 1, 0, 0 ]