text
stringlengths
70
7.94k
__index_level_0__
int64
105
711k
Title: A Survey on Resource Allocation in Vehicular Networks Abstract: Vehicular networks, an enabling technology for Intelligent Transportation System (ITS), smart cities, and autonomous driving, can deliver numerous on-board data services, e.g., road-safety, easy navigation, traffic efficiency, comfort driving, infotainment, etc. Providing satisfactory Quality of Service (QoS) in vehicular networks, however, is a challenging task due to a number of limiting factors such as erroneous and congested wireless channels (due to high mobility or uncoordinated channel-access), increasingly fragmented and congested spectrum, hardware imperfections, and anticipated growth of vehicular communication devices. Therefore, it will be critical to allocate and utilize the available wireless network resources in an ultra-efficient manner. In this paper, we present a comprehensive survey on resource allocation schemes for the two dominant vehicular network technologies, e.g. Dedicated Short Range Communications (DSRC) and cellular based vehicular networks. We discuss the challenges and opportunities for resource allocations in modern vehicular networks and outline a number of promising future research directions.
79,385
Title: On Incentive Compatibility in Dynamic Mechanism Design With Exit Option in a Markovian Environment Abstract: This paper studies dynamic mechanism design in a Markovian environment and analyzes a direct mechanism model of a principal-agent framework in which the agent is allowed to exit at any period. We consider that the agent’s private information, referred to as state, evolves over time. The agent makes decisions of whether to stop or continue and what to report at each period. The principal, on the other hand, chooses decision rules consisting of an allocation rule and a set of payment rules to maximize her ex-ante expected payoff. In order to influence the agent’s stopping decision, one of the terminal payment rules is posted-price, i.e., it depends only on the realized stopping time of the agent. This work focuses on the theoretical design regime of the dynamic mechanism design when the agent makes coupled decisions of reporting and stopping. A dynamic incentive compatibility constraint is introduced to guarantee the robustness of the mechanism to the agent’s strategic manipulation. A sufficient condition for dynamic incentive compatibility is obtained by constructing the payment rules in terms of a set of functions parameterized by the allocation rule. The payment rules are then pinned down up to a constant in terms of the allocation rule by deriving a first-order condition. We show cases of relaxations of the principal’s mechanism design problem and provide an approach to evaluate the loss of robustness of the dynamic incentive compatibility when the problem solving is relaxed due to analytical intractability. A case study is used to illustrate the theoretical results.
79,390
Title: Flow: A Modular Learning Framework for Mixed Autonomy Traffic Abstract: The rapid development of autonomous vehicles (AVs) holds vast potential for transportation systems through improved safety, efficiency, and access to mobility. However, the progression of these impacts, as AVs are adopted, is not well understood. Numerous technical challenges arise from the goal of analyzing the partial adoption of autonomy: partial control and observation, multivehicle int...
79,401
Title: A Price-Based Iterative Double Auction for Charger Sharing Markets Abstract: The unprecedented growth of demand for charging electric vehicles (EVs) calls for novel expansion solutions to today’s charging networks. Riding on the wave of the proliferation of sharing economy, Airbnb-like charger sharing markets open the opportunity to expand the existing charging networks without requiring costly and time-consuming infrastructure investments, yet the successful design of such markets relies on innovations at the interface between game theory, mechanism design, and large scale optimization. In this paper, we propose a price-based iterative double auction for charger sharing markets where charger owners rent out their under-utilized chargers to the charge-needing EV drivers. Charger owners and EV drivers form a two-sided market which is cleared by a price-based double auction. Chargers’ locations, availabilities, and unit time service costs as well as drivers’ time and location preferences are considered in the allocation and scheduling process. The goal is to compute social welfare maximizing schedules which benefit both charger owners and EV drivers and, in turn, ensure the continuous growth of the market. We prove that the proposed double auction is budget balanced and individually rational. In addition, results from our computational study show that the proposed auction achieves on average 94% efficiency compared with that of the optimal solutions and is suitable for a larger day-ahead charger sharing market setting in terms of running time.
79,408
Title: Subarchitecture Ensemble Pruning in Neural Architecture Search Abstract: Neural architecture search (NAS) is gaining more and more attention in recent years because of its flexibility and remarkable capability to reduce the burden of neural network design. To achieve better performance, however, the searching process usually costs massive computations that might not be affordable for researchers and practitioners. Although recent attempts have employed ensemble learning methods to mitigate the enormous computational cost, however, they neglect a key property of ensemble methods, namely diversity, which leads to collecting more similar subarchitectures with potential redundancy in the final design. To tackle this problem, we propose a pruning method for NAS ensembles called “ subarchitecture ensemble pruning in neural architecture search (SAEP).” It targets to leverage diversity and to achieve subensemble architectures at a smaller size with comparable performance to ensemble architectures that are not pruned. Three possible solutions are proposed to decide which subarchitectures to prune during the searching process. Experimental results exhibit the effectiveness of the proposed method by largely reducing the number of subarchitectures without degrading the performance.
79,436
Title: COMPLETE INTUITIONISTIC TEMPORAL LOGICS FOR TOPOLOGICAL DYNAMICS Abstract: The language of linear temporal logic can be interpreted on the class of dynamic topological systems, giving rise to the intuitionistic temporal logic ITL lozenge for all c, recently shown to be decidable by Fern ' andezDuque. In this article we axiomatize this logic, some fragments, and prove completeness for several familiar spaces.
79,475
Title: ConfusionFlow: A Model-Agnostic Visualization for Temporal Analysis of Classifier Confusion Abstract: Classifiers are among the most widely used supervised machine learning algorithms. Many classification models exist, and choosing the right one for a given task is difficult. During model selection and debugging, data scientists need to assess classifiers' performances, evaluate their learning behavior over time, and compare different models. Typically, this analysis is based on single-number perf...
79,478
Title: THE MULTIVARIATE SCHWARTZ-ZIPPEL LEMMA Abstract: Motivated by applications in combinatorial geometry, we consider the following question: Let lambda = (lambda(1), lambda(2), ..,lambda(m)) be an m-partition of a positive integer n, Si subset of C-lambda i be finite sets, and let S := S-1 x S-2 x ... x S-m, subset of C-n be the multigrid defined by S-i. Suppose p is an n-variate degree d polynomial. How many zeros does p have on S? We first develop a multivariate generalization of the combinatorial nullstellensatz that certifies existence of a point t is an element of S so that p(t) not equal 0. Then we show that a natural multivariate generalization of the DeMillo-Lipton-Schwartz- Zippel lemma holds, except for a special family of polynomials that we call lambda-reducible. This yields a simultaneous generalization of the Szemeredi-Trotter theorem and the Schwartz-Zippel lemma into higher dimensions, and has applications in incidence geometry. Finally, we develop a symbolic algorithm that identifies certain lambda-reducible polynomials. More precisely, our symbolic algorithm detects polynomials that include a Cartesian product of hypersurfaces in their zero set. It is likely that using Chow forms the algorithm can be generalized to handle arbitrary lambda-reducible polynomials, which we leave as an open problem.
79,489
Title: An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples Abstract: Software developers share programming solutions in Q&A sites like Stack Overflow, Stack Exchange, Android forum, and so on. The reuse of crowd-sourced code snippets can facilitate rapid prototyping. However, recent research shows that the shared code snippets may be of low quality and can even contain vulnerabilities. This paper aims to understand the nature and the prevalence of security vulnerabilities in crowd-sourced code examples. To achieve this goal, we investigate security vulnerabilities in the C++ code snippets shared on Stack Overflow over a period of 10 years. In collaborative sessions involving multiple human coders, we manually assessed each code snippet for security vulnerabilities following CWE (Common Weakness Enumeration) guidelines. From the 72,483 reviewed code snippets used in at least one project hosted on GitHub, we found a total of 99 vulnerable code snippets categorized into 31 types. Many of the investigated code snippets are still not corrected on Stack Overflow. The 99 vulnerable code snippets found in Stack Overflow were reused in a total of 2859 GitHub projects. To help improve the quality of code snippets shared on Stack Overflow, we developed a browser extension that allows Stack Overflow users to be notified for vulnerabilities in code snippets when they see them on the platform.
79,501
Title: Norm one Tori and Hasse norm principle. Abstract: Let $k$ be a field and $T$ be an algebraic $k$-torus. In 1969, over a global field $k$, Voskresenskii proved that there exists an exact sequence $0\to A(T)\to H^1(k,{\rm Pic}\,\overline{X})^\vee\to Sha(T)\to 0$ where $A(T)$ is the kernel of the weak approximation of $T$, $Sha(T)$ is the Shafarevich-Tate group of $T$, $X$ is a smooth compactification of $T$, $\overline{X}=X\times_k\overline{k}$, ${\rm Pic}\,\overline{X}$ is the Picard group of $\overline{X}$ and $\vee$ stands for the Pontryagin dual. In 1984, Kunyavskii showed that, among 73 cases of 3-dimensional $k$-tori $T$, there exist exactly 2 cases satisfy $H^1(k,{\rm Pic}\,\overline{X})\neq 0$. On the other hand, in 1963, Ono proved that $Sha(T)=0$ if and only if the Hasse norm principle holds for $K/k$ where $T=R^{(1)}_{K/k}(G_m)$ is the norm one torus of $K/k$. First, we show that, among 710 cases of 4-dimensional algebraic $k$-tori $T$, there exist exactly 2 (resp. 20, 688) cases with $H^1(k,{\rm Pic}\, \overline{X})\simeq(Z/2Z)^{\oplus 2}$ (resp. $H^1(k,{\rm Pic}\, \overline{X})\simeq Z/2Z$, $H^1(k,{\rm Pic}\, \overline{X})=0$). Among 6079 cases of 5-dimensional algebraic $k$-tori $T$, there exist exactly 11 (resp. 263, 5805) cases with $H^1(k,{\rm Pic}\, \overline{X})\simeq(Z/2Z)^{\oplus 2}$ (resp. $H^1(k,{\rm Pic}\, \overline{X})\simeq Z/2Z$, $H^1(k,{\rm Pic}\, \overline{X})=0$). Second, we determine $H^1(k,{\rm Pic}\, \overline{X})$ for norm one tori $T=R^{(1)}_{K/k}(G_m)$ with $[K:k]=n\leq 15$ and $n\neq 12$. We also show that $H^1(k,{\rm Pic}\, \overline{X})=0$ for the $5$ Mathieu groups $M_n\leq S_n$. Third, we give a necessary and sufficient condition for the Hasse norm principle for $K/k$ with $[K:k]=n\leq 15$ and $n\neq 12$. As applications of the results, we get the group $T(k)/R$ of $R$-equivalence classes over a local field $k$ and the Tamagawa number $\tau(T)$ over a number field $k$.
79,506
Title: Stochastic Port-Hamiltonian Systems Abstract: In the present work we formally extend the theory of port-Hamiltonian systems to include random perturbations. In particular, suitably choosing the space of flow and effort variables we will show how several elements coming from possibly different physical domains can be interconnected in order to describe a dynamic system perturbed by general continuous semimartingale. Relevant enough, the noise does not enter into the system solely as an external random perturbation, since each port is itself intrinsically stochastic. Coherently to the classical deterministic setting, we will show how such an approach extends existing literature of stochastic Hamiltonian systems on pseudo-Poisson and pre-symplectic manifolds. Moreover, we will prove that a power-preserving interconnection of stochastic port-Hamiltonian systems is a stochastic port-Hamiltonian system as well.
79,537
Title: Symbolic dynamics and rotation symmetric Boolean functions Abstract: We identify the weights wt(fn) of a family {fn} of rotation symmetric Boolean functions with the cardinalities of the sets of n-periodic points of a finite-type shift, recovering the second author’s result that said weights satisfy a linear recurrence. Similarly, the weights of idempotent functions fn defined on finite fields can be recovered as the cardinalities of curves over those fields and hence satisfy a linear recurrence as a consequence of the rationality of curves’ zeta functions. Weil’s Riemann hypothesis for curves then provides additional information about wt(fn). We apply our results to the case of quadratic functions and considerably extend the results in an earlier paper of ours.
79,538
Title: Template-Based Minor Embedding for Adiabatic Quantum Optimization Abstract: Quantum annealing (QA) can be used to quickly obtain near-optimal solutions for quadratic unconstrained binary optimization (QUBO) problems. In QA hardware, each decision variable of a QUBO should be mapped to one or more adjacent qubits in such a way that pairs of variables defining a quadratic term in the objective function are mapped to some pair of adjacent qubits. However, qubits have limited connectivity in existing QA hardware. This has spurred work on preprocessing algorithms for embedding the graph representing problem variables with quadratic terms into the hardware graph representing qubits adjacencies, such as the Chimera graph in hardware produced by D-Wave Systems. In this paper, we use integer linear programming to search for an embedding of the problem graph into certain classes of minors of the Chimera graph, which we call template embeddings. One of these classes corresponds to complete bipartite graphs, for which we show the limitation of the existing approach based on minimum odd cycle transversals (OCTs). One of the formulations presented is exact and thus can be used to certify the absence of a minor embedding using that template. On an extensive test set consisting of random graphs from five different classes of varying size and sparsity, we can embed more graphs than a state-of-the-art OCT-based approach, our approach scales better with the hardware size, and the runtime is generally orders of magnitude smaller. Summary of Contribution: Our work combines classical and quantum computing for operations research by showing that integer linear programming can be successfully used as a preprocessing step for adiabatic quantum optimization. We use it to determine how a quadratic unconstrained binary optimization problem can be solved by a quantum annealer in which the qubits are coupled as in a Chimera graph, such as in the quantum annealers currently produced by D-Wave Systems. The paper also provides a timely introduction to adiabatic quantum computing and related work on minor embeddings.
79,557
Title: Inverse norm estimation of perturbed Laplace operators and corresponding eigenvalue problems Abstract: In numerical existence proofs for solutions of the semi-linear elliptic system, evaluating the norm of the inverse of a perturbed Laplace operator plays an important role. We reveal an eigenvalue problem to design a method for verifying the invertibility of the operator and evaluating the norm of its inverse based on Liu's method and the Temple-Lehmann-Goerisch method. We apply the inverse-norm's estimation to the Dirichlet boundary value problem of the Lotka-Volterra system with diffusion terms and confirm the efficacy of our method.
79,558
Title: Symbiotic Graph Neural Networks for 3D Skeleton-Based Human Action Recognition and Motion Prediction Abstract: 3D skeleton-based action recognition and motion prediction are two essential problems of human activity understanding. In many previous works: 1) they studied two tasks separately, neglecting internal correlations; and 2) they did not capture sufficient relations inside the body. To address these issues, we propose a symbiotic model to handle two tasks jointly; and we propose two scales of graphs ...
79,559
Title: Weighted clustering ensemble: A review Abstract: •Compile and analyze the state-of-the-art in weighted clustering ensemble research.•Provide a unifying framework for weighted clustering ensemble.•Identify pros and cons of existing methods, and give suggestions on future research.
79,580
Title: Coordination Games on Weighted Directed Graphs Abstract: We study strategic games on weighted directed graphs, in which the payoff of a player is defined as the sum of the weights on the edges from players who chose the same strategy, augmented by a fixed non-negative integer bonus for picking a given strategy. These games capture the idea of coordination in the absence of globally common strategies. We identify natural classes of graphs for which finite improvement or coalition-improvement paths of polynomial length always exist, and, as a consequence, a (pure) Nash equilibrium or a strong equilibrium can be found in polynomial time. The considered classes of graphs are typical in network topologies: simple cycles correspond to the token ring local area networks, while open chains of simple cycles correspond to multiple independent rings topology from the recommendation G.8032v2 on the Ethernet ring protection switching. For simple cycles these results are optimal in the sense that without the imposed conditions on the weights and bonuses a Nash equilibrium may not even exist. Finally, we prove that the problem of determining the existence of a Nash equilibrium or of a strong equilibrium in these games is NP-complete already for unweighted graphs and with no bonuses assumed. This implies that the same problems for polymatrix games are strongly NP-hard.
79,599
Title: Eulerian time-stepping schemes for the non-stationary Stokes equations on time-dependent domains Abstract: This article is concerned with the discretisation of the Stokes equations on time-dependent domains in an Eulerian coordinate framework. Our work can be seen as an extension of a recent paper by Lehrenfeld and Olshanskii (ESAIM: M2AN 53(2):585-614, 2019), where BDF-type time-stepping schemes are studied for a parabolic equation onmoving domains. For space discretisation, a geometrically unfitted finite element discretisation is applied in combination with Nitsche's method to impose boundary conditions. Physically undefined values of the solution at previous time-steps are extended implicitly by means of so-called ghost penalty stabilisations. We derive a complete a priori error analysis of the discretisation error in space and time, including optimal L-2(L-2)-norm error bounds for the velocities. Finally, the theoretical results are substantiated with numerical examples.
79,621
Title: Proportional 2-Choosability with a Bounded Palette Abstract: Proportional choosability is a list coloring analogue of equitable coloring. Specifically, a k-assignment L for a graph G associates a list L(v) of k available colors to each v is an element of V(G). An L-coloring assigns a color to each vertex v from its list L(v). A proportional L-coloring of G is a proper L-coloring in which each color c is an element of boolean OR(v is an element of V(G)) L(v) is used left perpendicular(c)/kright perpendicular or inverted right perpendiculat eta(c)/kinverted left perpendicular times where eta(c) = vertical bar{v is an element of V(G) : c is an element of L(v)}vertical bar. A graph G is proportionally k-choosable if a proportional L-coloring of G exists whenever L is a k-assignment for G. Motivated by earlier work, we initiate the study of proportional choosability with a bounded palette by studying proportional 2-choosability with a bounded palette. In particular, when l >= 2, a graph G is said to be proportionally (2, l)-choosable if a proportional L-coloring of G exists whenever L is a 2-assignment for G satisfying vertical bar boolean OR(v is an element of V(G)) L(v)vertical bar <= l. We observe that a graph is proportionally (2, 2)-choosable if and only if it is equitably 2-colorable. As l gets larger, the set of proportionally (2, l)-choosable graphs gets smaller. We show that whenever l >= 5 a graph is proportionally (2, l)-choosable if and only if it is proportionally 2-choosable.
79,649
Title: The Facial Weak Order on Hyperplane Arrangements Abstract: We extend the facial weak order from finite Coxeter groups to central hyperplane arrangements. The facial weak order extends the poset of regions of a hyperplane arrangement to all its faces. We provide four non-trivially equivalent definitions of the facial weak order of a central arrangement: (1) by exploiting the fact that the faces are intervals in the poset of regions, (2) by describing its cover relations, (3) using covectors of the corresponding oriented matroid, and (4) using certain sets of normal vectors closely related to the geometry of the corresponding zonotope. Using these equivalent descriptions, we show that when the poset of regions is a lattice, the facial weak order is a lattice. In the case of simplicial arrangements, we further show that this lattice is semidistributive and give a description of its join-irreducible elements. Finally, we determine the homotopy type of all intervals in the facial weak order.
79,650
Title: A versatile combinatorial approach of studying products of long cycles in symmetric groups Abstract: Let SX denote the symmetric group of permutations on the set X. Studies on triples of permutations satisfying certain conditions have a long history. Particularly interesting cases are when one of the involved permutations is a long cycle, and another involved one is either an involution or also a long cycle. Suppose {B1,B2,…,Bk} is a family of disjoint sets. Here we solve the problem of enumerating the pairs of long cycles on ⋃i=1kBi whose product is a member of the direct product SB1×SB2×⋯×SBk. For those pairs of long cycles the projection of whose product onto SBi contains di cycles, we also obtain the first explicit counting formula.
79,654
Title: Meta-Transfer Learning Through Hard Tasks Abstract: Meta-learning has been proposed as a framework to address the challenging few-shot learning setting. The key idea is to leverage a large number of similar few-shot tasks in order to learn how to adapt a base-learner to a new task for which only a few labeled samples are available. As deep neural networks (DNNs) tend to overfit using a few samples only, typical meta-learning models use shallow neural networks, thus limiting its effectiveness. In order to achieve top performance, some recent works tried to use the DNNs pre-trained on large-scale datasets but mostly in straight-forward manners, e.g., (1) taking their weights as a warm start of meta-training, and (2) freezing their convolutional layers as the feature extractor of base-learners. In this paper, we propose a novel approach called <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">meta-transfer learning (MTL)</i> , which learns to transfer the weights of a deep NN for few-shot learning tasks. Specifically, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">meta</i> refers to training multiple tasks, and <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">transfer</i> is achieved by learning scaling and shifting functions of DNN weights (and biases) for each task. To further boost the learning efficiency of MTL, we introduce the <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">hard task (HT) meta-batch</i> scheme as an effective learning curriculum of few-shot classification tasks. We conduct experiments for five-class few-shot classification tasks on three challenging benchmarks, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">mini</i> ImageNet, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">tiered</i> ImageNet, and Fewshot-CIFAR100 (FC100), in both supervised and semi-supervised settings. Extensive comparisons to related works validate that our MTL approach trained with the proposed HT meta-batch scheme achieves top performance. An ablation study also shows that both components contribute to fast convergence and high accuracy.
79,660
Title: Learning high-order structural and attribute information by knowledge graph attention networks for enhancing knowledge graph embedding Abstract: The goal of representation learning of knowledge graph is to encode both entities and relations into a low-dimensional embedding space. Many recent works have demonstrated the benefits of knowledge graph embedding on knowledge graph completion task, such as relation extraction. However, we observe that: (1) existing methods simply take direct relations between entities into consideration and fails to express high-order structural relationships between entities; (2) these methods simply leverage relation triples of Knowledge Graphs while ignoring a large number of attribute triples that encode rich semantic information. To overcome these limitations, this paper proposes a novel knowledge graph embedding method, named (KANE), which is inspired by the recent developments in graph convolutional networks (GCN). KANE can capture both high-order structural and attribute information of Knowledge Graphs in an efficient, explicit and unified manner under the graph convolutional networks framework. Empirical results on three datasets show that KANE significantly outperforms seven state-of-the-art methods. Further analysis verify the efficiency of our method and the benefits brought by the attention mechanism.
79,676
Title: Dynamic Mode Decomposition for Continuous Time Systems with the Liouville Operator Abstract: Dynamic mode decomposition (DMD) has become synonymous with the Koopman operator, where continuous time dynamics are discretized and examined using Koopman (i.e. composition) operators. Using the newly introduced "occupation kernels," the present manuscript develops an approach to DMD that treats continuous time dynamics directly through the Liouville operator. This manuscript outlines the technical and theoretical differences between Koopman-based DMD for discrete time systems and Liouville-based DMD for continuous time systems, which includes an examination of Koopman and Liouville operators over several reproducing kernel Hilbert spaces. While Liouville operators are modally unbounded, this manuscript introduces the concept of a scaled Liouville operator, which, for many dynamical systems, is a compact operator over the native space of the exponential dot product kernel. Compactness of scaled Liouville operators allows for norm convergence of Liouville-based DMD, which is a decided advantage over Koopman-based DMD.
79,680
Title: Optimal Training of Fair Predictive Models. Abstract: Recently there has been sustained interest in modifying prediction algorithms to satisfy fairness constraints. These constraints are typically complex nonlinear functionals of the observed data distribution. Focusing on the causal constraints proposed by Nabi and Shpitser (2018), we introduce new theoretical results and optimization techniques to make model training easier and more accurate. Specifically, we show how to reparameterize the observed data likelihood such that fairness constraints correspond directly to parameters that appear in the likelihood, transforming a complex constrained optimization objective into a simple optimization problem with box constraints. We also exploit methods from empirical likelihood theory in statistics to improve predictive performance, without requiring parametric models for high-dimensional feature vectors.
79,688
Title: Tree Automata and Pigeonhole Classes of Matroids: I Abstract: Hliněný’s Theorem shows that any sentence in the monadic second-order logic of matroids can be tested in polynomial time, when the input is limited to a class of $${\mathbb {F}}$$ -representable matroids with bounded branch-width (where $${\mathbb {F}}$$ is a finite field). If each matroid in a class can be decomposed by a subcubic tree in such a way that only a bounded amount of information flows across displayed separations, then the class has bounded decomposition-width. We introduce the pigeonhole property for classes of matroids: if every subclass with bounded branch-width also has bounded decomposition-width, then the class is pigeonhole. An efficiently pigeonhole class has a stronger property, involving an efficiently-computable equivalence relation on subsets of the ground set. We show that Hliněný’s Theorem extends to any efficiently pigeonhole class. In a sequel paper, we use these ideas to extend Hliněný’s Theorem to the classes of fundamental transversal matroids, lattice path matroids, bicircular matroids, and $$H$$ -gain-graphic matroids, where H is any finite group. We also give a characterisation of the families of hypergraphs that can be described via tree automata: a family is defined by a tree automaton if and only if it has bounded decomposition-width. Furthermore, we show that if a class of matroids has the pigeonhole property, and can be defined in monadic second-order logic, then any subclass with bounded branch-width has a decidable monadic second-order theory.
79,704
Title: The Short-Side Advantage in Random Matching Markets. Abstract: A recent breakthrough of Ashlagi, Kanoria, and Leshno [AKL17] found that imbalance in the number of agents on each side of a random matching market has a profound effect on the expected behavior of the stable matches. Specifically, across all stable matchings, the "long side" (i.e. the side with a greater number of agents) receives significantly worse matches in expectation than the short side. We provide new intuition and a new proof for preliminary results in the spirit of [AKL17], showing that the "long side" is at a noticeable disadvantage in all stable matchings.
79,710
Title: Interaction Relational Network for Mutual Action Recognition Abstract: Person-person mutual action recognition (also referred to as interaction recognition) is an important research branch of human activity analysis. Current solutions in the field – mainly dominated by CNNs, GCNs and LSTMs – often consist of complicated architectures and mechanisms to embed the relationships between the two persons on the architecture itself, to ensure the interaction patterns can be...
79,737
Title: L-Platooning: A Protocol for Managing a Long Platoon With DSRC Abstract: Vehicle platooning is an automated driving technology that enables a group of vehicles to travel very closely together as a single unit to improve fuel efficiency and driving safety. These advantages of platooning attract huge interests from academia and industry, especially logistics companies that can utilize the platooning technology for their heavy-duty trucks due to the huge cost savings. In this paper, we demonstrate that existing platooning solutions, however, fail to support formation of a ‘long’ platoon consisting of many vehicles especially long-body heavy-duty trucks due to the limited range of vehicle-to-vehicle communication such as DSRC and device-to-device communication for C-V2X. To address this problem, we propose <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">L-Platooning</i> , the first platooning protocol that enables seamless, reliable, and rapid formation of a long platoon. We introduce a novel concept called <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Virtual Leader</i> that refers to a vehicle that acts as a platoon leader to extend the coverage of the original platoon leader. A virtual leader election algorithm is developed to effectively designate a virtual leader based on the novel metric called the <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Virtual Leader Quality Index (VLQI)</i> which quantifies the effectiveness of a vehicle serving as a platoon leader. We also develop mechanisms for <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">L-Platooning</i> to support the vehicle join and leave maneuvers specifically for a long platoon. Through extensive simulations, we demonstrate that <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">L-Platooning</i> enables vehicles to form a long platoon effectively by allowing them to maintain the desired inter-vehicle distance accurately. We also show that <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">L-Platooning</i> handles seamlessly the vehicle join and leave maneuvers for a long platoon.
79,751
Title: Many faces of symmetric edge polytopes Abstract: Symmetric edge polytopes are a class of lattice polytopes constructed from finite simple graphs. In the present paper we highlight their connections to the Kuramoto synchronization model in physics - where they are called adjacency polytopes - and to Kantorovich-Rubinstein polytopes from finite metric space theory. Each of these connections motivates the study of symmetric edge polytopes of particular classes of graphs. We focus on such classes and apply algebraic-combinatorial methods to investigate invariants of the associated symmetric edge polytopes.
79,752
Title: On graphic elementary lifts of graphic matroids Abstract: An elementary lift of a binary matroid M that arises from a binary coextension of M can easily be obtained by applying the splitting operation on M. This operation on a graphic matroid may not produce a graphic matroid. We give a method to determine the forbidden minors for the class of graphic matroids M such that the splitting of M by any set of k elements is again a graphic matroid. Using this method, we obtain such minors for k = 2, 3, 4. One may compute such minors for k >= 5. As a consequence, we obtain the forbidden minors for the class of graphic matroids whose all elementary lifts obtained via binary coextensions are also graphic. There are six such graphic minors. (C) 2022 Elsevier B.V. All rights reserved.
79,784
Title: Symmetric binary Steinhaus triangles and parity-regular Steinhaus graphs Abstract: A binary Steinhaus triangle is a triangle of zeroes and ones that points down and with the same local rule as the Pascal triangle modulo 2. A binary Steinhaus triangle is said to be rotationally symmetric, horizontally symmetric or dihedrally symmetric if it is invariant under the 120 degrees rotation, the horizontal reflection or both, respectively. The first part of this paper is devoted to the study of linear subspaces of rotationally symmetric, horizontally symmetric and dihedrally symmetric binary Steinhaus triangles. We obtain simple explicit bases for each of them by using elementary properties of the binomial coefficients. A Steinhaus graph is a simple graph with an adjacency matrix whose upper-triangular part is a binary Steinhaus triangle. A Steinhaus graph is said to be even or odd if all its vertex degrees are even or odd, respectively. One of the main results of this paper is the existence of an isomorphism between the linear subspace of even Steinhaus graphs and a certain linear subspace of dihedrally symmetric binary Steinhaus triangles. This permits us to give, in the second part of this paper, an explicit basis for even Steinhaus graphs and for the vector space of parity-regular Steinhaus graphs; i.e., the linear subspace of Steinhaus graphs that are even or odd. Finally, in the last part of this paper, we consider the generalized Pascal triangles, that are triangles of zeroes and ones, that point up now, and always with the same local rule as the Pascal triangle modulo 2. New simple bases for each linear subspace of symmetric generalized Pascal triangles are deduced from the results of the first part.
79,803
Title: Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages Abstract: Web applications continue to be a favorite target for hackers due to a combination of wide adoption and rapid deployment cycles, which often lead to the introduction of high-impact vulnerabilities. Static analysis tools are important to search for vulnerabilities automatically in the program source code, supporting developers on their removal. However, building these tools requires programming the knowledge on how to discover the vulnerabilities. This article presents an alternative approach in which tools <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">learn</i> to detect flaws automatically by resorting to artificial intelligence concepts, more concretely to natural language processing. The approach employs a sequence model to learn to characterize vulnerabilities based on an annotated corpus. Afterwards, the model is utilized to discover and identify vulnerabilities in the source code. It was implemented in the DEKANT tool and evaluated experimentally with a large set of PHP applications and WordPress plugins. Overall, we found several thousand vulnerabilities belonging to 15 classes of input validation vulnerabilities, where 4143 of them were zero-day.
79,868
Title: Bounding The Tripartite-Circle Crossing Number Of Complete Tripartite Graphs Abstract: A tripartite-circle drawing of a tripartite graph is a drawing in the plane, where each part of a vertex partition is placed on one of three disjoint circles, and the edges do not cross the circles. We present upper and lower bounds on the minimum number of crossings in tripartite-circle drawings of $K_{m,n,p}$ and the exact value for $K_{2,2,n}$. In contrast to 1- and 2-circle drawings, which may attain the Harary-Hill bound, our results imply that balanced restricted 3-circle drawings of the complete graph are not optimal.
79,881
Title: Game-Theoretic Modeling of Traffic in Unsignalized Intersection Network for Autonomous Vehicle Control Verification and Validation Abstract: For a foreseeable future, autonomous vehicles (AVs) will operate in traffic together with human-driven vehicles. Their planning and control systems need extensive testing, including early-stage testing in simulations where the interactions among autonomous/human-driven vehicles are represented. Motivated by the need for such simulation tools, we propose a game-theoretic approach to modeling vehicl...
79,896
Title: Positivity of chromatic symmetric functions associated with Hessenberg functions of bounce number 3 Abstract: We give a proof of the Stanley-Stembridge conjecture on chromatic symmetric functions for the class of all unit interval graphs with independence number 3. That is, we show that the chromatic symmetric function of the incomparability graph of a unit interval order in which the length of a chain is at most 3 is positively expanded as a linear sum of elementary symmetric functions.
79,906
Title: Partial Exponential Stability Analysis of Slow–Fast Systems via Periodic Averaging Abstract: This article presents some new criteria for the partial exponential stability of a slow–fast nonlinear system with a fast scalar variable using periodic averaging methods. Unlike classical averaging techniques, we construct an averaged system by averaging over this fast scalar variable instead of the time variable. We show that the partial exponential stability of the averaged system implies that of the original one. We then apply the obtained criteria to the study of remote synchronization of Kuramoto–Sakaguchi oscillators coupled by a star network with two peripheral nodes. We show that detuning the natural frequency of the central mediating oscillator increases the robustness of the remote synchronization against phase shifts. This article appears to be the first-known attempt to analytically study the phase-unlocked remote synchronization.
79,916
Title: Cluster Algebras and Binary Subwords Abstract: This paper establishes a connection between binary subwords and perfect matchings of a snake graph, an important tool in the theory of cluster algebras. Every binary expansion w can be associated to a piecewise-linear poset P and a snake graph G. We construct a tree structure called the antichain trie which is isomorphic to the trie of subwords introduced by Leroy, Rigo, and Stipulanti. We then present bijections from the subwords of w to the antichains of P and to the perfect matchings of G.
79,924
Title: Probabilistic Deterministic Finite Automata and Recurrent Networks, Revisited Abstract: Reservoir computers (RCs) and recurrent neural networks (RNNs) can mimic any finite-state automaton in theory, and some workers demonstrated that this can hold in practice. We test the capability of generalized linear models, RCs, and Long Short-Term Memory (LSTM) RNN architectures to predict the stochastic processes generated by a large suite of probabilistic deterministic finite-state automata (PDFA) in the small-data limit according to two metrics: predictive accuracy and distance to a predictive rate-distortion curve. The latter provides a sense of whether or not the RNN is a lossy predictive feature extractor in the information-theoretic sense. PDFAs provide an excellent performance benchmark in that they can be systematically enumerated, the randomness and correlation structure of their generated processes are exactly known, and their optimal memory-limited predictors are easily computed. With less data than is needed to make a good prediction, LSTMs surprisingly lose at predictive accuracy, but win at lossy predictive feature extraction. These results highlight the utility of causal states in understanding the capabilities of RNNs to predict.
79,927
Title: Partial combinatory algebra and generalized numberings Abstract: Generalized numberings are an extension of Ershov's notion of numbering, based on partial combinatory algebra (pca) instead of the natural numbers. We study various algebraic properties of generalized numberings, relating properties of the numbering to properties of the pca. As in the lambda calculus, extensionality is a key notion here.
79,933
Title: Hypothesis Test and Confidence Analysis With Wasserstein Distance on General Dimension Abstract: We develop a general framework for statistical inference with the 1-Wasserstein distance. Recently, the Wasserstein distance has attracted considerable attention and has been widely applied to various machine learning tasks because of its excellent properties. However, hypothesis tests and a confidence analysis for it have not been established in a general multivariate setting. This is because the limit distribution of the empirical distribution with the Wasserstein distance is unavailable without strong restriction. To address this problem, in this study, we develop a novel nonasymptotic gaussian approximation for the empirical 1-Wasserstein distance. Using the approximation method, we develop a hypothesis test and confidence analysis for the empirical 1-Wasserstein distance. We also provide a theoretical guarantee and an efficient algorithm for the proposed approximation. Our experiments validate its performance numerically.
79,934
Title: Achieving robustness to aleatoric uncertainty with heteroscedastic Bayesian optimisation Abstract: Bayesian optimisation is a sample-efficient search methodology that holds great promise for accelerating drug and materials discovery programs. A frequently-overlooked modelling consideration in Bayesian optimisation strategies however, is the representation of heteroscedastic aleatoric uncertainty. In many practical applications it is desirable to identify inputs with low aleatoric noise, an example of which might be a material composition which displays robust properties in response to a noisy fabrication process. In this paper, we propose a heteroscedastic Bayesian optimisation scheme capable of representing and minimising aleatoric noise across the input space. Our scheme employs a heteroscedastic Gaussian process surrogate model in conjunction with two straightforward adaptations of existing acquisition functions. First, we extend the augmented expected improvement heuristic to the heteroscedastic setting and second, we introduce the aleatoric noise-penalised expected improvement (ANPEI) heuristic. Both methodologies are capable of penalising aleatoric noise in the suggestions. In particular, the ANPEI acquisition yields improved performance relative to homoscedastic Bayesian optimisation and random sampling on toy problems as well as on two real-world scientific datasets. Code is available at: https://github.com/Ryan-Rhys/Heteroscedastic-BO
79,935
Title: The Quantum Approximate Optimization Algorithm and the Sherrington-Kirkpatrick Model at Infinite Size Abstract: The Quantum Approximate Optimization Algorithm (QAOA) is a general-purpose algorithm for combinatorial optimization problems whose performance can only improve with the number of layers p. While QAOA holds promise as an algorithm that can be run on near-term quantum computers, its computational power has not been fully explored. In this work, we study the QAOA applied to the Sherrington-Kirkpatrick (SK) model, which can be understood as energy minimization of n spins with all-to-all random signed couplings. There is a recent classical algorithm [1] that, assuming a widely believed conjecture, can efficiently find an approximate solution for a typical instance of the SK model to within (1 - is an element of) times the ground state energy. We hope to match its performance with the QAOA. Our main result is a novel technique that allows us to evaluate the typical-instance energy of the QAOA applied to the SK model. We produce a formula for the expected value of the energy, as a function of the 2p QAOA parameters, in the infinite size limit that can be evaluated on a computer with O(16p) complexity. We evaluate the formula up to p = 12, and find that the QAOA at p = 11 outperforms the standard semidefinite programming algorithm. Moreover, we show concentration: With probability tending to one as n -> infinity, measurements of the QAOA will produce strings whose energies concentrate at our calculated value. As an algorithm running on a quantum computer, there is no need to search for optimal parameters on an instance-by-instance basis since we can determine them in advance. What we have here is a new framework for analyzing the QAOA, and our techniques can be of broad interest for evaluating its performance on more general problems where classical algorithms may fail.
79,957
Title: Digital fundamental groups and edge groups of clique complexes. Abstract: In previous work, we have defined---intrinsically, entirely within the digital setting---a fundamental group for digital images. Here, we show that this group is isomorphic to the edge group of the clique complex of the digital image considered as a graph. The clique complex is a simplicial complex and its edge group is well-known to be isomorphic to the ordinary (topological) fundamental group of its geometric realization. This identification of our intrinsic digital fundamental group with a topological fundamental group---extrinsic to the digital setting---means that many familiar facts about the ordinary fundamental group may be translated into their counterparts for the digital fundamental group: The digital fundamental group of any digital circle is $\mathbb{Z}$; a version of the Seifert-van Kampen Theorem holds for our digital fundamental group; every finitely presented group occurs as the (digital) fundamental group of some digital image. We also show that the (digital) fundamental group of every 2D digital image is a free group.
79,958
Title: INDUCED MORPHISMS BETWEEN HEYTING-VALUED MODELS Abstract: To the best of our knowledge, there are very few results on how Heyting-valued models are affected by the morphisms on the complete Heyting algebras that determine them: the only cases found in the literature are concerning automorphisms of complete Boolean algebras and complete embeddings between them (i.e., injective Boolean algebra homomorphisms that preserve arbitrary suprema and arbitrary infima). In the present work, we consider and explore how more general kinds of morphisms between complete Heyting algebras H and H' induce arrows between V-(H) and V-(H') , and between their corresponding localic topoi Set (H) (similar or equal to Sh (H)) and Set((H')) (similar or equal to Sh (H')). More specifically: any geometric morphism f* : Set ((H)) -> Set((H')) (that automatically came from a unique locale morphism f : H -> H') can be "lifted" to an arrow (f) over tilde : V-(H) V-(H'). We also provide some semantic preservation results concerning this arrow (f) over tilde : V-(H) -> V-(H').
79,959
Title: Inverse Modeling of Hydrologic Parameters in CLM4 via Generalized Polynomial Chaos in the Bayesian Framework Abstract: In this work, generalized polynomial chaos (gPC) expansion for land surface model parameter estimation is evaluated. We perform inverse modeling and compute the posterior distribution of the critical hydrological parameters that are subject to great uncertainty in the Community Land Model (CLM) for a given value of the output LH. The unknown parameters include those that have been identified as the most influential factors on the simulations of surface and subsurface runoff, latent and sensible heat fluxes, and soil moisture in CLM4.0. We set up the inversion problem in the Bayesian framework in two steps: (i) building a surrogate model expressing the input-output mapping, and (ii) performing inverse modeling and computing the posterior distributions of the input parameters using observation data for a given value of the output LH. The development of the surrogate model is carried out with a Bayesian procedure based on the variable selection methods that use gPC expansions. Our approach accounts for bases selection uncertainty and quantifies the importance of the gPC terms, and, hence, all of the input parameters, via the associated posterior probabilities.
79,972
Title: Abelian group actions and hypersmooth equivalence relations Abstract: We show that a Borel action of a standard Borel group which is isomorphic to a sum of a countable abelian group with a countable sum of real lines and circles induces an orbit equivalence relation which is hypersmooth, i.e., Borel reducible to eventual agreement on sequences of reals, and it follows from this result along with the structure theory for locally compact abelian groups that Borel actions of Polish LCA groups induce orbit equivalence relations which are essentially hyperfinite, extending a result of Gao and Jackson and answering a question of Ding and Gao.
79,985
Title: S-DIGing: A Stochastic Gradient Tracking Algorithm for Distributed Optimization Abstract: In this article, we study convex optimization problems where agents of a network cooperatively minimize the global objective function which consists of multiple local objective functions. The intention of this work is to solve large-scale optimization problems where the local objective function is complicated, and numerous. Different from most of the existing works, the local objective function of...
79,989
Title: On Weighted Sums of Numbers of Convex Polygons in Point Sets Abstract: Let S be a set of n points in general position in the plane, and let $$X_{k,\ell }(S)$$ be the number of convex k-gons with vertices in S that have exactly  $$\ell $$ points of S in their interior. We prove several equalities for the numbers $$X_{k,\ell }(S)$$ . This problem is related to the Erdős–Szekeres theorem. Some of the obtained equations also extend known equations for the numbers of empty convex polygons to polygons with interior points. Analogous results for higher dimension are shown as well.
79,990
Title: Opinion Shaping in Social Networks Using Reinforcement Learning Abstract: In this article, we consider a variant of the classical DeGroot model of opinion propagation with random interactions, in which a prescribed subset of agents is amenable to a control parameter. There are also some stubborn agents and some agents that are neither stubborn nor amenable to control. We map the problem to a shortest path problem, where the control parameter is coupled across controlled nodes because of a common resource constraint. Hence, the problem is not amenable to a pure dynamic programming approach, and the classical reinforcement learning schemes for the latter cannot be applied here for maximizing average influence in the long run. We view it instead as a parametric optimization problem and not a control problem and use a nonclassical policy gradient scheme. We analyze its performance theoretically and through numerical experiments. We also consider a situation when only certain interactions between agents are observed.
79,998
Title: Personalized Graph Neural Networks With Attention Mechanism for Session-Aware Recommendation Abstract: The problem of session-aware recommendation aims to predict users’ next click based on their current session and historical sessions. Existing session-aware recommendation methods have defects in capturing complex item transition relationships. Other than that, most of them fail to explicitly distinguish the effects of different historical sessions on the current session. To this end, we propose a novel method, named Personalized Graph Neural Networks with Attention Mechanism (A-PGNN) for brevity. A-PGNN mainly consists of two components: one is Personalized Graph Neural Network (PGNN), which is used to extract the personalized structural information in each user behavior graph, compared with the traditional Graph Neural Network (GNN) model, which considers the role of the user when the node embedding is updated. The other is Dot-Product Attention mechanism, which draws on the Transformer net to explicitly model the effect of historical sessions on the current session. Extensive experiments conducted on two real-world data sets show that A-PGNN evidently outperforms the state-of-the-art personalized session-aware recommendation methods.
80,004
Title: Amortized Rejection Sampling in Universal Probabilistic Programming Abstract: Naive approaches to amortized inference in probabilistic programs with unbounded loops can produce estimators with infinite variance. This is particularly true of importance sampling inference in programs that explicitly include rejection sampling as part of the user-programmed generative procedure. In this paper we develop a new and efficient amortized importance sampling estimator. We prove finite variance of our estimator and empirically demonstrate our method's correctness and efficiency compared to existing alternatives on generative programs containing rejection sampling loops and discuss how to implement our method in a generic probabilistic programming framework.
80,016
Title: Decision programming for mixed-integer multi-stage optimization under uncertainty Abstract: •Mixed-integer linear programming formulations for influence diagrams are presented.•Even problems in which the no-forgetting assumption does not hold can be solved.•Many kinds of resource, logical and risk constraints can be accommodated.•All non-dominated strategies can be computed in problems with multiple objectives.•Support for project porfolio selection under endogenous uncertainties is given.
80,030
Title: A tableau construction for finite linear-time temporal logic Abstract: This paper gives a tableau-based technique for converting formulas in finite propositional linear-time temporal logic (Finite LTL) into finite-state automata whose languages are the models of the given formula. Finite LTL differs from traditional LTL in that formulas are interpreted with respect to finite, rather than infinite, sequences of states; this fact means that traditional finite-state automata, rather than ω-automata such as those developed by Büchi and others, suffice for recognizing models of such formulas. The approach presented here works by associating with each state in the constructed automaton a Finite LTL formula satisfied by the sequences that can be accepted by the automaton when started in the given state. Such tableau-construction techniques are well-known in the setting of traditional LTL, where they are used to construct ω-automata; we adapt here for the setting of Finite LTL and finite-state automata. The resulting automata may be used as a basis for model checking, model synthesis, query checking and satisfiability testing.
80,040
Title: A stochastic extra-step quasi-Newton method for nonsmooth nonconvex optimization Abstract: In this paper, a novel stochastic extra-step quasi-Newton method is developed to solve a class of nonsmooth nonconvex composite optimization problems. We assume that the gradient of the smooth part of the objective function can only be approximated by stochastic oracles. The proposed method combines general stochastic higher order steps derived from an underlying proximal type fixed-point equation with additional stochastic proximal gradient steps to guarantee convergence. Based on suitable bounds on the step sizes, we establish global convergence to stationary points in expectation and an extension of the approach using variance reduction techniques is discussed. Motivated by large-scale and big data applications, we investigate a stochastic coordinate-type quasi-Newton scheme that allows to generate cheap and tractable stochastic higher order directions. Finally, numerical results on large-scale logistic regression and deep learning problems show that our proposed algorithm compares favorably with other state-of-the-art methods.
80,042
Title: Toward a Reinforcement Learning Environment Toolbox for Intelligent Electric Motor Control Abstract: Electric motors are used in many applications, and their efficiency is strongly dependent on their control. Among others, linear feedback approaches or model predictive control methods are well known in the scientific literature and industrial practice. A novel approach is to use reinforcement learning (RL) to have an agent learn electric drive control from scratch merely by interacting with a sui...
80,048
Title: High-dimensional robust approximated M-estimators for mean regression with asymmetric data Abstract: Asymmetry along with heteroscedasticity or contamination often occurs with the growth of data dimensionality. In ultra-high dimensional data analysis, such irregular settings are usually overlooked for both theoretical and computational convenience. In this paper, we establish a framework for estimation in high-dimensional regression models using Penalized Robust Approximated quadratic M-estimators (PRAM). This framework allows general settings such as random errors lack symmetry and homogeneity, or covariates are not sub-Gaussian. To reduce the possible bias caused by data’s irregularity in mean regression, PRAM adopts a loss function with an adaptive robustification parameter. Theoretically, we first show that, in the ultra-high dimension setting, PRAM estimators have local estimation consistency at the minimax rate enjoyed by the LS-Lasso. Then we show that PRAM with an appropriate non-convex penalty in fact agrees with the local oracle solution, and thus obtain its oracle property. Computationally, we compare the performances of six PRAM estimators (Huber, Tukey’s biweight or Cauchy loss function combined with Lasso or MCP penalty function). Our simulation studies and real data analysis demonstrate satisfactory finite sample performances of the PRAM estimator under different irregular settings.
80,054
Title: Generalized Tensor Decomposition With Features on Multiple Modes Abstract: Higher-order tensors have received increased attention across science and engineering. While most tensor decomposition methods are developed for a single tensor observation, scientific studies often collect side information, in the form of node features and interactions thereof, together with the tensor data. Such data problems are common in neuroimaging, network analysis, and spatial-temporal modeling. Identifying the relationship between a high-dimensional tensor and side information is important yet challenging. Here, we develop a tensor decomposition method that incorporates multiple feature matrices as side information. Unlike unsupervised tensor decomposition, our supervised decomposition captures the effective dimension reduction of the data tensor confined to feature space of interest. An efficient alternating optimization algorithm with provable spectral initialization is further developed. Our proposal handles a broad range of data types, including continuous, count, and binary observations. We apply the method to diffusion tensor imaging data from human connectome project and multi-relational political network data. We identify the key global connectivity pattern and pinpoint the local regions that are associated with available features. The package and data used are available at . for this article are available online.
80,056
Title: ConEx: Efficient Exploration of Big-Data System Configurations for Better Performance Abstract: Configuration space complexity makes the big-data software systems hard to configure well. Consider Hadoop, with over nine hundred parameters, developers often just use the default configurations provided with Hadoop distributions. The opportunity costs in lost performance are significant. Popular learning-based approaches to auto-tune software does not scale well for big-data systems becau...
80,068
Title: Self-Correction for Human Parsing Abstract: Labeling pixel-level masks for fine-grained semantic segmentation tasks, e.g., human parsing, remains a challenging task. The ambiguous boundary between different semantic parts and those categories with similar appearances are usually confusing for annotators, leading to incorrect labels in ground-truth masks. These label noises will inevitably harm the training process and decrease the performan...
80,080
Title: A hybrid stochastic differential reinsurance and investment game with bounded memory Abstract: •We study a hybrid stochastic differential reinsurance and investment game with bounded memory.•We consider the reinsurer’s monopoly and the competitive relationship between insurers.•We derive the equilibrium strategy and value functions explicitly.•We find competitive factors reduce the reinsurance demand and the reinsurance premium price.•We find the delay factor discourages or stimulates investment depending on the length of delay.
80,088
Title: Order Distances and Split Systems Abstract: Given a pairwise distance D on the elements in a finite set X, the order distance Δ(D) on X is defined by first associating a total preorder ≼x on X to each x ∈X based on D, and then quantifying the pairwise disagreement between these total preorders. The order distance can be useful in relational analyses because using Δ(D) instead of D may make such analyses less sensitive to small variations in D. Relatively little is known about properties of Δ(D) for general distances D. Indeed, nearly all previous work has focused on understanding the order distance of a treelike distance, that is, a distance that arises as the shortest path distances in a tree with non-negative edge weights and X mapped into its vertex set. In this paper we study the order distance Δ(D) for distances D that can be decomposed into sums of simpler distances called split-distances. Such distances D generalize treelike distances, and have applications in areas such as classification theory and phylogenetics.
80,110
Title: Continuous Control Set Nonlinear Model Predictive Control of Reluctance Synchronous Machines Abstract: In this article, we describe the design and implementation of a current controller for a reluctance synchronous machine (RSM) based on continuous control set nonlinear model predictive control (NMPC). A computationally efficient gray box model of the flux linkage map, the Gaussian-linear-arctangent (GLA) model, is proposed and employed in a tracking formulation, which is implemented using the high...
80,145
Title: Dynamic Multiagent Assignment Via Discrete Optimal Transport Abstract: We propose an optimal solution to a dynamic assignment problem to assign a group of moving agents to another group of moving targets. Our approach leverages connections to the theory of discrete optimal transport to convert the problem into a tractable linear program. We simultaneously solve for the optimal assignment and the control of the individual agents. As a result, we can account for dynamics and capabilities of a heterogeneous set of agents and targets. In contrast to existing assignment schemes, this approach considers cost metrics informed by the underlying agent dynamics and capabilities rather than just distance. We show that the minimizer of the dynamic assignment problem is equivalent to the minimizer of the associated Monge problem from optimal transport. We prove that the resulting approach only requires a single assignment computation over the operating lifetime, rather than periodic reassignment. Furthermore, we demonstrate cost benefits that increase as the network size increases, achieving almost 50% cost reduction compared with distance-based metrics. We demonstrate our approach through simulation on several multiagent and multitarget tracking problems.
80,152
Title: Large scale model predictive control with neural networks and primal active sets Abstract: This work presents an explicit–implicit procedure to compute a model predictive control (MPC) law with guarantees on recursive feasibility and asymptotic stability. The approach combines an offline-trained fully-connected neural network with an online primal active set solver. The neural network provides a control input initialization while the primal active set method ensures recursive feasibility and asymptotic stability. The neural network is trained with a primal–dual loss function, aiming to generate control sequences that are primal feasible and meet a desired level of suboptimality. Since the neural network alone does not guarantee constraint satisfaction, its output is used to warm start the primal active set method online. We demonstrate that this approach scales to large problems with thousands of optimization variables, which are challenging for current approaches. Our method achieves a 2× reduction in online inference time compared to the best method in a benchmark suite of different solver and initialization strategies.
80,161
Title: Localization game for random graphs Abstract: We consider the localization game played on graphs in which a cop tries to determine the exact location of an invisible robber by exploiting distance probes. The minimum number of probes necessary per round to locate the robber on a given graph G is the localization number zeta(G). In this paper, we improve the bounds for dense random graphs determining the asymptotic behaviour of zeta(G). Moreover, we extend the argument to sparse graphs. (C) 2021 Elsevier B.V. All rights reserved.
80,193
Title: COUNTING SIBLINGS IN UNIVERSAL THEORIES Abstract: We show that if a countable structure M in a finite relational language is not cellular, then there is an age-preserving N superset of M such that 2(N0) many structures are bi-embeddable with N. The proof proceeds by a case division based on mutual algebraicity.
80,194
Title: Games in possibility capacities with payoff expressed by fuzzy integral Abstract: This paper studies non-cooperative games where players are allowed to play their mixed non-additive strategies. Expected payoffs are expressed by so-called fuzzy integrals: Choquet integral, Sugeno integral and generalizations of Sugeno integral obtained by using triangular norms. We consider the existence problem of Nash equilibrium for such games. Positive results for Sugeno integral and its generalizations are obtained. However we provide some example of a game with Choquet payoffs which have no Nash equilibrium. Such example demonstrates that fuzzy integrals based on the maximum operation are more suitable for possibility capacities than Choquet integral which is based on the addition operation.
80,205
Title: Hierarchical Representation Learning in Graph Neural Networks With Node Decimation Pooling Abstract: In graph neural networks (GNNs), pooling operators compute local summaries of input graphs to capture their global properties, and they are fundamental for building deep GNNs that learn hierarchical representations. In this work, we propose the Node Decimation Pooling (NDP), a pooling operator for GNNs that generates coarser graphs while preserving the overall graph topology. During training, the ...
80,210
Title: Improved approximation for maximum edge colouring problem Abstract: The anti-Ramsey number, ar(G, H) is the minimum integer k such that in any edge colouring of G with k colours there is a rainbow subgraph isomorphic to H, namely, a copy of H with each of its edges assigned a different colour. The notion was introduced by Erdos and Simonovits in 1973. Since then the parameter has been studied extensively. The case when H is a star graph was considered by several graph theorists from the combinatorial point of view. Recently this case received the attention of researchers from the algorithm community because of its applications in interface modelling of wireless networks. To the algorithm community, the problem is known as maximum edge q-colouring problem: Find a colouring of the edges of G, maximizing the number of colours satisfying the constraint that each vertex spans at most q colours on its incident edges. It is easy to see that the maximum value of the above optimization problem equals ar(G, K1,q+1) - 1. In this paper, we study the maximum edge 2-colouring problem from the approx-imation algorithm point of view. The case q = 2 is particularly interesting due to its application in real-life problems. Algorithmically, this problem is known to be NP-hard for q - 2. For the case of q = 2, it is also known that no polynomial-time algorithm can approximate to a factor less than 3/2 assuming the unique games conjecture. Feng et al. showed a 2-approximation algorithm for this problem. Later Adamaszek and Popa presented a 5/3-approximation algorithm with the additional assumption that the input graph has a perfect matching. Note that the obvious but the only known algorithm issues different colours to the edges of a maximum matching (say M) and different colours to the connected components of G \ M. In this article, we give a new analysis of the aforementioned algorithm to show that for triangle-free graphs with perfect matching the approximation ratio is 8/5. We also show that this algorithm cannot achieve a factor better than 58/37 on triangle free graphs that has a perfect matching. The contribution of the paper is a completely new, deeper and closer analysis of how the optimum achieves a higher number of colours than the matching based algorithm, mentioned above.(c) 2021 Published by Elsevier B.V.
80,231
Title: Wreath product in automorphism groups of graphs Abstract: The automorphism group of the composition of graphs G circle H $G\circ H$ contains the wreath product A u t ( H ) wreath product A u t ( G ) $Aut(H)\,\wr \,Aut(G)$ of the automorphism groups of the corresponding graphs. The classical problem considered by Sabidussi and Hemminger was under what conditions G circle H $G\circ H$ has no other automorphisms. In this paper we consider questions related to the converse: if the automorphism group of a graph is a wreath product A wreath product B $A\,\wr \,B$, are the smaller groups necessarily automorphism groups of graphs? And if so, are the corresponding smaller graphs involved in the construction? We consider these questions for the wreath product in its natural imprimitive action (which refers to the results by Sabidussi and Hemminger), and in generalization to colored graphs, which seems to be a more appropriate setting. For this case we have a fairly complete answer. Yet, we also consider the same problems for the wreath product in its product action. This turns out to be more complicated and we have only partial results. Our considerations in this part lead to interesting open questions involving hypergraphs and to an analogue of the Sabidussi-Hemminger problem for a related graph construction.
80,235
Title: Platoon Trajectories Generation: A Unidirectional Interconnected LSTM-Based Car-Following Model Abstract: Car-following models have been widely applied and made remarkable achievements in traffic engineering. However, the traffic micro-simulation accuracy of car-following models in a platoon level, especially during traffic oscillations, still needs to be enhanced. Rather than using traditional individual car-following models, we proposed a new trajectory generation approach to generate platoon level ...
80,237
Title: Deep Q-learning for same-day delivery with vehicles and drones Abstract: •We address the dynamic same-day delivery problem with fleets of drones and vehicles.•We present a deep Q-learning approach exploiting both state and action space information.•We provide a detailed analysis in the functionality of our method and the resulting policies.
80,245
Title: sEMG-Based Natural Control Interface for a Variable Stiffness Transradial Hand Prosthesis Abstract: We propose, implement, and evaluate a natural human-machine control interface for a variable stiffness transradial hand prosthesis that achieves tele-impedance control through surface electromyography (sEMG) signals. This interface, together with variable stiffness actuation (VSA), enables an amputee to modulate the impedance of the prosthetic limb to properly match the requirements of a task while performing activities of daily living (ADL). Both the desired position and stiffness references are estimated through sEMG signals and used to control the VSA hand prosthesis. In particular, regulation of hand impedance is managed through the impedance measurements of the intact upper arm; this control takes place naturally and automatically as the amputee interacts with the environment, while the position of the hand prosthesis is regulated intentionally by the amputee through the estimated position of the shoulder. The proposed approach is advantageous since the impedance regulation takes place naturally without requiring amputees' attention and diminishing their functional capability. Consequently, the proposed interface is easy to use, does not require long training periods or interferes with the control of intact body segments. This control approach is evaluated through human subject experiments conducted over able volunteers where adequate estimation of references and independent control of position and stiffness are demonstrated.
80,248
Title: Attention for Inference Compilation Abstract: We present a neural network architecture for automatic amortized inference in universal probabilistic programs which improves on the performance of current architectures. Our approach extends inference compilation (IC), a technique which uses deep neural networks to approximate a posterior distribution over latent variables in a probabilistic program. A challenge with existing IC network architectures is that they can fail to capture long-range dependencies between latent variables. To address this, we introduce an attention mechanism that attends to the most salient variables previously sampled in the execution of a probabilistic program. We demonstrate that the addition of attention allows the proposal distributions to better match the true posterior, enhancing inference about latent variables in simulators.
80,251
Title: Automated Classification of Overfitting Patches With Statically Extracted Code Features Abstract: Automatic program repair (APR) aims to reduce the cost of manually fixing software defects. However, APR suffers from generating a multitude of overfitting patches, those patches that fail to correctly repair the defect beyond making the tests pass. This paper presents a novel overfitting patch detection system called ODS to assess the correctness of APR patches. ODS first statically compares a patched program and a buggy program in order to extract code features at the abstract syntax tree (AST) level, for the single programming language Java. Then, ODS uses supervised learning with the captured code features and patch correctness labels to automatically learn a probabilistic model. The learned ODS model can then finally be applied to classify new and unseen program repair patches. We conduct a large-scale experiment to evaluate the effectiveness of ODS on patch correctness classification based on 10,302 patches from Defects4J, Bugs.jar and Bears benchmarks. The empirical evaluation shows that ODS is able to correctly classify 71.9 percent of program repair patches from 26 projects, which improves the state-of-the-art. ODS is applicable in practice and can be employed as a post-processing procedure to classify the patches generated by different APR systems.
80,259
Title: The Vlasov-Fokker-Planck equation with high dimensional parametric forcing term Abstract: We consider the Vlasov-Fokker-Planck equation with random electric field where the random field is parametrized by countably many infinite random variables due to uncertainty. At the theoretical level, with suitable assumption on the anisotropy of the randomness, adopting the technique employed in elliptic PDEs (Cohen and DeVore in Acta Numerica 24:1-159, 2015) , we prove the best N approximation in the random space enjoys a convergence rate, which depends on the summability of the coefficients of the random variable, higher than the Monte-Carlo method. For the numerical method, based on the adaptive sparse polynomial interpolation (ASPI) method introduced in Chkifa et al. (Found Comput Math 14:601-603, 2014), we develop a residual based adaptive sparse polynomial interpolation (RASPI) method which is more efficient for multi-scale linear kinetic equation, when using numerical schemes that are time dependent and implicit. Numerical experiments show that the numerical error of the RASPI decays faster than the Monte-Carlo method and is also dimension independent.
80,265
Title: CONNA: Addressing Name Disambiguation on the Fly Abstract: Name disambiguation is a key and also a very tough problem in many online systems such as social search and academic search. Despite considerable research, a critical issue that has not been systematically studied is <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">disambiguation on the fly</i> — to complete the disambiguation in the real-time. This is very challenging, as the disambiguation algorithm must be accurate, efficient, and error tolerance. In this paper, we propose a novel framework — CONNA — to train a matching component and a decision component jointly via reinforcement learning. The matching component is responsible for finding the top matched candidate for the given paper, and the decision component is responsible for deciding on assigning the top matched person or creating a new person. The two components are intertwined and can be bootstrapped via jointly training. Empirically, we evaluate CONNA on two name disambiguation datasets. Experimental results show that the proposed framework can achieve a 1.21-19.84 percent improvement on F1-score using joint training of the matching and the decision components. The proposed CONNA has been successfully deployed on AMiner — a large online academic search system.
80,270
Title: Fostering Peer Learning With a Game-Theoretical Approach in a Blended Learning Environment Abstract: This study proposes a mechanism and an instructional design in order to foster well-organized peer learning based on game theory (PD_PL). The proposed mechanism uses prisoner’s dilemma (PD), the most widely known example of game theory in a dynamically blended and collaborative learning environment. PD_PL maps the strategy and payoff concepts found in PD onto a peer learning (PL) atmosphere. As is...
80,273
Title: Rigorous numerics for nonlinear heat equations in the complex plane of time Abstract: In this paper, we introduce a method for computing rigorous local inclusions of solutions of Cauchy problems for nonlinear heat equations for complex time values. The proof is constructive and provides explicit bounds for the inclusion of the solution of the Cauchy problem, which is rewritten as a zero-finding problem on a certain Banach space. Using a solution map operator, we construct a simplified Newton operator and show that it has a unique fixed point. The fixed point together with its rigorous bounds provides the local inclusion of the solution of the Cauchy problem. The local inclusion technique is then applied iteratively to compute solutions over long time intervals. This technique is used to prove the existence of a branching singularity in the nonlinear heat equation. Finally, we introduce an approach based on the Lyapunov–Perron method for calculating part of a center-stable manifold and prove that an open set of solutions of the Cauchy problem converge to zero, hence yielding the global existence of the solutions in the complex plane of time.
80,288
Title: Design, Implementation, and Evaluation of a Variable Stiffness Transradial Hand Prosthesis Abstract: We present the design, implementation, and experimental evaluation of a low-cost, customizable, easy-to-use transradial hand prosthesis capable of adapting its compliance. Variable stiffness actuation (VSA) of the prosthesis is based on antagonistically arranged tendons coupled to nonlinear springs driven through a Bowden cable based power transmission. Bowden cable based antagonistic VSA can, not only regulate the stiffness and the position of the prosthetic hand but also enables a light-weight and low-cost design, by the opportunistic placement of motors, batteries, and controllers on any convenient location on the human body, while nonlinear springs are conveniently integrated inside the forearm. The transradial hand prosthesis also features tendon driven underactuated compliant fingers that allow natural adaption of the hand shape to wrap around a wide variety of object geometries, while the modulation of the stiffness of their drive tendons enables the prosthesis to perform various tasks with high dexterity. The compliant fingers of the prosthesis add inherent robustness and flexibility, even under impacts. The control of the variable stiffness transradial hand prosthesis is achieved by an sEMG based natural human-machine interface.
80,299
Title: PREVALENCE OF DEFICIENCY-ZERO REACTION NETWORKS IN AN ERDOS-RENYI FRAMEWORK Abstract: Reaction networks are commonly used within the mathematical biology and mathematical chemistry communities to model the dynamics of interacting species. These models differ from the typical graphs found in random graph theory since their vertices are constructed from elementary building blocks, i.e. the species. We consider these networks in an Erdos-Renyi framework and, under suitable assumptions, derive a threshold function for the network to have a deficiency of zero, which is a property of great interest in the reaction network community. Specifically, if the number of species is denoted by n and the edge probability by p(n), then we prove that the probability of a random binary network being deficiency zero converges to 1 if p(n) << r(n) as n -> infinity, and converges to 0 if p(n) >> r(n) as n -> infinity, where r(n) = 1/n(3).
80,316
Title: Optimal Nonparametric Multivariate Change Point Detection and Localization Abstract: We study the multivariate nonparametric change point detection problem, where the data are a sequence of independent $p$ -dimensional random vectors whose distributions are piecewise-constant with Lipschitz densities changing at unknown times, called change points. We quantify the size of the distributional change at any chang...
80,360
Title: Flexible Graph Connectivity Abstract: We introduce and study the problem Flexible Graph Connectivity, which in contrast to many classical connectivity problems features a non-uniform failure model. We distinguish between safe and unsafe resources and postulate that failures can only occur among the unsafe resources. Given an undirected edge-weighted graph and a set of unsafe edges, the task is to find a minimum-cost subgraph that remains connected after removing at most k unsafe edges. We give constant-factor approximation algorithms for this problem for $$k = 1$$ as well as for unit costs and $$k \ge 1$$ . Our approximation guarantees are close to the known best bounds for special cases, such as the 2-edge-connected spanning subgraph problem and the tree augmentation problem. Our algorithm and analysis combine various techniques including a weight-scaling algorithm, a charging argument that uses a variant of exchange bijections between spanning trees and a factor revealing min–max–min optimization problem.
80,362
Title: Pipe Roughness Identification Of Water Distribution Networks: A Tensor Method Abstract: The identification of pipe roughnesses in a water distribution network is formulated as a nonlinear system of algebraic equations which turns out to be demanding to solve under real-world circumstances. This paper proposes an enhanced technique to numerically solve this identification problem, extending the conventional Newton-Raphson approach with second-order derivatives in the determination of the search direction. Despite the requirement to solve a nonlinear equation to obtain a search direction, the application of the Hadamard/Schur product operator enables the resulting formulation to be represented compactly and thus facilitates the development of an efficient and more robust solving-technique. Algorithms on the basis of this more enhanced solving method are then compared to a customized Newton-Raphson approach in simulation examples. (C) 2021 Published by Elsevier Inc.
80,364
Title: Semantic Object Accuracy for Generative Text-to-Image Synthesis Abstract: Generative adversarial networks conditioned on textual image descriptions are capable of generating realistic-looking images. However, current methods still struggle to generate images based on complex image captions from a heterogeneous domain. Furthermore, quantitatively evaluating these text-to-image models is challenging, as most evaluation metrics only judge image quality but not the conformity between the image and its caption. To address these challenges we introduce a new model that explicitly models individual objects within an image and a new evaluation metric called <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Semantic Object Accuracy</i> (SOA) that specifically evaluates images given an image caption. The SOA uses a pre-trained object detector to evaluate if a generated image contains objects that are mentioned in the image caption, e.g., whether an image generated from <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">“a car driving down the street”</i> contains a car. We perform a user study comparing several text-to-image models and show that our SOA metric ranks the models the same way as humans, whereas other metrics such as the Inception Score do not. Our evaluation also shows that models which explicitly model objects outperform models which only model global image characteristics.
80,366
Title: Parametric interpolation framework for scalar conservation laws Abstract: In this paper we present a novel framework for obtaining high-order numerical methods for scalar conservation laws in one-space dimension for both the homogeneous and non-homogeneous cases (or balance laws). The numerical schemes for these two settings are somewhat different in the presence of shocks, however at their core they both rely heavily on the solution curve being represented parametrically. By utilizing high-order parametric interpolation techniques we succeed to obtain fifth order accuracy (in space) everywhere in the computation domain, including the shock location itself. In the presence of source terms a slight modification is required, yet the spatial order is maintained but with an additional temporal error appearing. We provide a detailed discussion of a sample scheme for non-homogeneous problems which obtains fifth order in space and fourth order in time even in the presence of shocks.
80,380
Title: Stochastic Galerkin methods for the Boltzmann-Poisson system Abstract: We study uncertainty quantification for a Boltzmann-Poisson system that models electron transport in semiconductors and the physical collision mechanisms over the charges, using the stochastic Galerkin method in order to handle the randomness associated with the problem. In this study we choose first as a source of uncertainty the phonon energy, taking it as a random variable, as its value influences the energy jump appearing in the collision integral for electron-phonon scattering. Then we choose the lattice temperature as a random variable, since it defines the value of the collision operator terms in the case of electron-phonon scattering by being a parameter of the phonon distribution. Finally, we present our numerical simulations for the latter case. We calculate then with our stochastic Discontinuous Galerkin methods the uncertainty in kinetic moments such as density, mean energy, current, etc. associated to a possible physical temperature variation (assumed to follow a uniform distribution) in the lattice environment, as this uncertainty in the temperature is propagated into the electron PDF. Our mathematical and computational results let us predict then in a real world problem setting the impact that possible variations in the lab conditions (such as temperature) or limitations in the mathematical model (such as assumption of a constant phonon energy) will have over the uncertainty in the behavior of electronic devices.
80,382
Title: When Does Diversity Help Generalization in Classification Ensembles? Abstract: Ensembles, as a widely used and effective technique in the machine learning community, succeed within a key element—“diversity.” The relationship between diversity and generalization, unfortunately, is not entirely understood and remains an open research issue. To reveal the effect of diversity on the generalization of classification ensembles, we investigate three issues on diversity, that is, the measurement of diversity, the relationship between the proposed diversity and the generalization error, and the utilization of this relationship for ensemble pruning. In the diversity measurement, we measure diversity by error decomposition inspired by regression ensembles, which decompose the error of classification ensembles into accuracy and diversity. Then, we formulate the relationship between the measured diversity and ensemble performance through the theorem of margin and generalization and observe that the generalization error is reduced effectively only when the measured diversity is increased in a few specific ranges, while in other ranges, larger diversity is less beneficial to increasing the generalization of an ensemble. Besides, we propose two pruning methods based on diversity management to utilize this relationship, which could increase diversity appropriately and shrink the size of the ensemble without much-decreasing performance. The empirical results validate the reasonableness of the proposed relationship between diversity and ensemble generalization error and the effectiveness of the proposed pruning methods.
80,395
Title: A Distributed Model-Free Algorithm for Multi-Hop Ride-Sharing Using Deep Reinforcement Learning Abstract: The growth of autonomous vehicles, ridesharing systems, and self-driving technology will bring a shift in the way ride hailing platforms plan out their services. However, these advances in technology coupled with road congestion, environmental concerns, fuel usage, vehicles emissions, and the high cost of the vehicle usage have brought more attention to better utilize the use of vehicles and their capacities. In this paper, we propose a novel distributed multi-hop ride-sharing (MHRS) algorithm that uses deep reinforcement learning to learn optimal vehicle dispatch and matching decisions by interacting with the external environment. By allowing customers to transfer between vehicles, i.e., ride with one vehicle for some time and then transfer to another one, MHRS helps in attaining 30% lower cost and 20% more efficient utilization of fleets, as compared to the ride-sharing algorithms. This flexibility of multi-hop feature gives a seamless experience to customers and ride-sharing companies, and thus improves ride-sharing services.
80,422
Title: Alexa, Who Am I Speaking To?: Understanding Users’ Ability to Identify Third-Party Apps on Amazon Alexa Abstract: AbstractMany Internet of Things devices have voice user interfaces. One of the most popular voice user interfaces is Amazon’s Alexa, which supports more than 50,000 third-party applications (“skills”). We study how Alexa’s integration of these skills may confuse users. Our survey of 237 participants found that users do not understand that skills are often operated by third parties, that they often confuse third-party skills with native Alexa functions, and that they are unaware of the functions that the native Alexa system supports. Surprisingly, users who interact with Alexa more frequently are more likely to conclude that a third-party skill is a native Alexa function. The potential for misunderstanding creates new security and privacy risks: attackers can develop third-party skills that operate without users’ knowledge or masquerade as native Alexa functions. To mitigate this threat, we make design recommendations to help users better distinguish native functionality and third-party skills, including audio and visual indicators of native and third-party contexts, as well as a consistent design standard to help users learn what functions are and are not possible on Alexa.
80,430
Title: Conical averagedness and convergence analysis of fixed point algorithms Abstract: We study a conical extension of averaged nonexpansive operators and the role it plays in convergence analysis of fixed point algorithms. Various properties of conically averaged operators are systematically investigated, in particular, the stability under relaxations, convex combinations and compositions. We derive conical averagedness properties of resolvents of generalized monotone operators. These properties are then utilized in order to analyze the convergence of the proximal point algorithm, the forward-backward algorithm, and the adaptive Douglas-Rachford algorithm. Our study unifies, improves and casts new light on recent studies of these topics.
80,435
Title: Multivariate Uncertainty in Deep Learning Abstract: Deep learning has the potential to dramatically impact navigation and tracking state estimation problems critical to autonomous vehicles and robotics. Measurement uncertainties in state estimation systems based on Kalman and other Bayes filters are typically assumed to be a fixed covariance matrix. This assumption is risky, particularly for “black box” deep learning models, in which uncertainty can vary dramatically and unexpectedly. Accurate quantification of multivariate uncertainty will allow for the full potential of deep learning to be used more safely and reliably in these applications. We show how to model multivariate uncertainty for regression problems with neural networks, incorporating both aleatoric and epistemic sources of heteroscedastic uncertainty. We train a deep uncertainty covariance matrix model in two ways: directly using a multivariate Gaussian density loss function and indirectly using end-to-end training through a Kalman filter. We experimentally show in a visual tracking problem the large impact that accurate multivariate uncertainty quantification can have on the Kalman filter performance for both in-domain and out-of-domain evaluation data. We additionally show, in a challenging visual odometry problem, how end-to-end filter training can allow uncertainty predictions to compensate for filter weaknesses.
80,438
Title: Modeling Feature Representations for Affective Speech Using Generative Adversarial Networks Abstract: Emotion recognition is a classic field of research with a typical setup extracting features and feeding them through a classifier for prediction. On the other hand, generative models jointly capture the distributional relationship between emotions and the feature profiles. Recently, Generative Adversarial Networks (GANs) have surfaced as a new class of generative models and have shown considerable success in modeling distributions in the fields of computer vision and natural language understanding. In this article, we experiment with variants of GAN architectures to generate feature vectors corresponding to an emotion in two ways: (i) A generator is trained with samples from a mixture prior. Each mixture component corresponds to an emotional class and can be sampled to generate features from the corresponding emotion. (ii) A one-hot vector corresponding to an emotion can be explicitly used to generate the features. We perform analysis on such models and also propose different metrics used to measure the performance of the GAN models in their ability to generate realistic synthetic samples. Apart from evaluation on a given dataset of interest, we perform a cross-corpus study where we study the utility of the synthetic samples as additional training data in low resource conditions.
80,466
Title: On Second-Moment Stability of Discrete-Time Linear Systems With General Stochastic Dynamics Abstract: This article provides a new unified framework for second-moment stability of discrete-time linear systems with stochastic dynamics. Relations of notions of second-moment stability are studied for systems with general stochastic dynamics, and associated Lyapunov inequalities are derived. The system dynamics may depend on any type of stochastic process in our framework. Our results for the unified framework can immediately lead us to more specific and tractable stability conditions when the underlying stochastic process is restricted to a more definite one. Usefulness of the developed framework is demonstrated through three selected applications.
80,490
Title: Short and Wide Network Paths Abstract: Network flow is a powerful mathematicalframework to systematically explore the relationship between structure and function in biological, social, and technological networks. We introduce a new pipelining model of flow through networks where commodities must be transported over single paths rather than split over several paths and recombined. We show this notion of pipelined network flow is optimiz...
80,492
Title: On the rate of convergence of alternating minimization for non-smooth non-strongly convex optimization in Banach spaces Abstract: In this paper, the convergence of the fundamental alternating minimization is established for non-smooth non-strongly convex optimization problems in Banach spaces, and novel rates of convergence are provided. As objective function a composition of a smooth, and a block-separable, non-smooth part is considered, covering a large range of applications. For the former, three different relaxations of strong convexity are considered: (i) quasi-strong convexity; (ii) quadratic functional growth; and (iii) plain convexity. With new and improved rates benefiting from both separate steps of the scheme, linear convergence is proved for (i) and (ii), whereas sublinear convergence is showed for (iii).
80,496
Title: On the supersingular GPST attack Abstract: The main attack against static-key supersingular isogeny Diffie-Hellman (SIDH) is the Galbraith- Petit-Shani-Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange. In this paper, we identify and study a specific assumption on which the GPST attack relies that does not necessarily hold in all circumstances. We show that in some circumstances the attack fails to recover part of the secret key. We also characterize the conditions necessary for the attack to fail and show that it rarely happens in real cases. We give a link with collisions in the Charles-Goren-Lauter (CGL) hash function.
80,499
Title: Debiased Distributed Learning for Sparse Partial Linear Models in High Dimensions Abstract: Although various distributed machine learning schemes have been proposed recently for purely linear models and fully nonparametric models, little attention has been paid to distributed optimization for semi-parametric models with multiple structures (e.g. sparsity, linearity and nonlinearity). To address these issues, the current paper proposes a new communication-efficient distributed learning algorithm for sparse partially linear models with an increasing number of features. The proposed method is based on the classical divide and conquer strategy for handling big data and the computation on each subsample consists of a debiased estimation of the doubly regularized least squares approach. With the proposed method, we theoretically prove that our global parametric estimator can achieve the optimal parametric rate in our semi-parametric model given an appropriate partition on the total data. Specifically, the choice of data partition relies on the underlying smoothness of the nonparametric component, and it is adaptive to the sparsity parameter. Finally, some simulated experiments are carried out to illustrate the empirical performances of our debiased technique under the distributed setting.
80,506
Title: Revisiting Image-Language Networks for Open-Ended Phrase Detection Abstract: Most existing work that grounds natural language phrases in images starts with the assumption that the phrase in question is relevant to the image. In this paper we address a more realistic version of the natural language grounding task where we must both identify whether the phrase is relevant to an image and localize the phrase. This can also be viewed as a generalization of object ...
80,510